Assignment 470

What would you do?

 

There is a famous and controversial story about a 1961–62 experiment by Yale social psychologist Stanley Milgram to investigate how people respond to orders given by people in authority. Much has been written about this experiment and details have been changed and embellished over the years, but the basic ethical issues it raises are still worth considering, even if the details of the actual study have been distorted.

 

The participants were ordinary residents of New Haven who were asked to administer increasingly high levels of electric shocks to participants when they made errors in the tasks they were given. As the electric shocks got more and more severe, so did the apparent pain of the participants receiving them, to the extent that some appeared to be on the verge of dying. Not surprisingly, those administering the shocks became increasingly disturbed by what they were being asked to do, but several continued, believing that they should do as their superiors told them. What they did not realize was that the so-called participants were, in fact, very convincing actors who were not being injured at all. Instead, the shock administrators were themselves the real subjects of the experiment. It was their responses to authority that were being studied in this deceptive experiment.

 

This story raises several important ethical issues. First, this experiment reveals how power relationships can be used to control others. Second and equally important, this experiment relied on deception. The experimenters were, in fact, the subjects and the fake participants colluded with the real scientists to deceive them. Without this deception the experiment would not have worked.

 

Is it acceptable to deceive subjects to this extent for the sake of scientific discovery? What do you think?

PLEASE ANSWER IN YOUR OWN WORDS, THIS IS NOT AN ESSAY…..THANK YOU

Week 6 Discussion Board SafeAssign Check Instructions: Review the discussion question below. Type your discussion post into a MS Word document (.doc or .docx). As part of the Week 6 Discussion Board assignment, you will submit a MS Word document (.doc or

Instructions:

  • Review the discussion question below.
  • Type your discussion post into a MS Word document (.doc or .docx).
  • As part of the Week 6 Discussion Board assignment, you will submit a MS Word document (.doc or.docx) containing the exact contents of your initial discussion board post using the provided assignment submission link.  The originality of each submitted document will be checked using the SafeAssign originality-checking tool.  The discussion board assignment will receive zero points if incomplete, inaccurate, insufficient, or no documents are uploaded to SafeAssign.
  • Click the Week 6 SafeAssign Check Link above to submit it through SafeAssign. 
  • Revise as needed.
  • Copy and paste the content in your MS Word document (.doc or.docx) into the discussion board using the Week 6 Discussion Board link below.  Do not attach the MS Word document to the discussion board.

Discussion Question:

  • After watching the video, Defining the legal and ethical boundaries at the cyber frontier, create your own thread discussing at least three concepts presented in or that you learned from the video.

Videos:

Watch Video

Defining the legal and ethical boundaries at the cyber frontier
User: n/a – Added: 10/23/12

need a follwup response due by 12p this is the 2nd part to the discussion question need to be original no less then 150 words no plagiarism

According to our text on page 335, NSAIDs are described to be nonsteroidal anti-inflammatory drugs. This means that they are used to combat inflammation and reduce pain. Examples of these drugs include Naproxen (Aleve), Aspirin, and Ibuprofen (Motrin).

I found an article outlining the major differences between NSAIDs and Acetaminophen. One of the key differences that I noted from this article was that both medication helps to relieve pain and reduce fevers, but only NSAIDs could reduce inflammation (Harvard Health, 2015).

Acetaminophen can best treat ailments such as headaches and muscle aches. According to the National Library of Medicine, acetaminophen can also help to reduce fevers (Acetaminophen, 2014). The medication acetaminophen belongs to a class of medications called analgesics (pain relievers) and antipyretics (fever reducers).

Naproxen best treats aches, fevers, and inflammation or swelling. Some key reasons to use the NSAID naproxen would be conditions like arthritis, bursitis, and muscle aches. The page on the National Library of Medicine for Naproxen, the medication “works by stopping the body’s production of a substance that causes pain, fever, and inflammation” (Naproxen, 2014).

Aspirin belongs to the class of medications known as salicylates. This class of medications work to stop the production of that cause fever, pain, swelling, and blood clots. The National Library of Medicine also has a page for information on aspirin. The article mentions that aspirin best works to reduce fever, aid in the prevention of heart attack, and is used to relieve the symptoms of arthritis (Aspirin, 2016).

The National Library of Medicine lists information for the final medication of this discussion, as well. Ibuprofen is listed as a member of the NSAID class of medications, just like Naproxen. As it is similar to the other members of this class, Ibuprofen works to reduce inflammation, pain, and fever. Some common ailments that could be treated with Ibuprofen include: headaches, muscle aches, arthritis, menstrual pain, and fever (Ibuprofen, 2016).

 

References

Harvard Health Publications. (2015). 11 things you should know about common pain relievers – Harvard Health. Retrieved October 17, 2016, from http://www.health.harvard.edu/pain/12-things-you-should-know-about-pain-relievers

National Library of Medicine. (2014). Acetaminophen. Retrieved October 17, 2016, from https://medlineplus.gov/druginfo/meds/a681004.html#why

National Library of Medicine. (2016). Aspirin. Retrieved October 17, 2016, from https://medlineplus.gov/druginfo/meds/a682878.html

National Library of Medicine. (2016). Ibuprofen. Retrieved October 17, 2016, from https://medlineplus.gov/druginfo/meds/a682159.html

National Library of Medicine. (2014). Naproxen. Retrieved October 17, 2016, from https://medlineplus.gov/druginfo/meds/a681029.htm

Week 7 Organizational Change Paper Attached Files: File Generic Change Management.ppt (1.812 MB) File Kotter-Leading-Change-Why-transformation-efforts-fail.pdf (692.857 KB) File Kubler Ross.pdf (20.058 KB) File Improvisationsal model for change.pdf (190.2

This paper will give you an opportunity to evaluate a failed organizational change, identify a theory that could have been used to develop the change, and aapply that theory to the failed change. The paper must follow these standards:

  • be 8-10 pages of content in length
  • have at least three outside professional resources
  • follow APA standards

A PowerPoint of the paper is attached as well as the PowerPoint and the docuemtns discussing organizational change.

Week-2

System Request Form

1.    Statement of the Business Problem (System Request Form)

 

Business Problem Statement:

 

 

Write about Keller college of New York. ?

 

 

System Scope Statement:

 

 

Write about Keller college of New York. ?

 

 

High-Level Functional Requirements:

 

 

Write about Keller college of New York. ?

 

 

Business Benefits:(Tangible and Intangible)

 

 

Write about Keller college of New York. ?

 

 

Special Issues or Constraints:

 

Write about Keller college of New York. ?

 

 

2.    Business Requirements: Using Microsoft Visio and Microsoft Word or Excel, your team will need to create the following diagrams for your project. (Refer to the textbook for examples.)

o    Context Level Data Flow Diagram (Visio)

o    Use Case List (normal business activities/work flows)

o    Use Case Diagram (Visio)

o    Use Case Scenarios (Description or narrative of steps in each use case)

 

 

3.    References: 

need ASAP please by 8am

Math 2200
Take Home Quiz
Due Tuesday April 11
th
at the start of class
For each problem: Identify the type of test, write out the null and alternative hypothesis, and include a statement along
with your decision.
1.
Marine engines, particularly those of
large container or cargo ships, are rated to burn fuel based on its viscosity.
The most common fuel is known as 6 oil and should have a kinematic viscosity of 15 mm/s
2
at 100
o
C. Jonny ran
a set of 12 samples of 6 oil from a shore tank and calculated the
mean
viscosity as 14.3 mm/s
2
with a standard
deviation of
1.2
mm/s
2
.
Can Jonny conclude at 99% confidence that the shore tank of 6 oil
is
off spec
? Assume
the distribution is approximately normal.
2.
Gasoline retailers are mandated by the EPA to
have completely transitioned to selling summer
grade gasoline by
June 1
st
every year. To be considered summer
grade, the Reid Vapor Pressure (RVP)
of the gasoline
can be no
more than 9
psi
.
Enmark
et
is under suspicion of selling winter grade gas past the
June 1
st
deadline. An
investigator pulls
3
0 samples of gas from various Enmark
et
locations and the mean RVP is found to be
9.49
psi.
If the standard deviation of the test method is known to be
0
.
75
psi, can the investigator conclude that they are
sellin
g the wrong grade?
3.
The rumor among gasoline chemists is that
Russia
n oil/gas is very low quality and
Russi
an
boats are rejected
more often than others.
A
s
a
single barge of gasoline can be worth
$
7
10 million dollar
s
,
ships are
rarely
rejected
(assume no more than 15% of the time)
.
Shamgan was bored one day while waiting for the cargo boat
to arrive and decided to check the old laboratory records.
In the last
3
years a total of
38
gasoline ships
originated from Russia
. Of those
,
7
failed
their chemical testing
and were rejected
.
At a significance level of
95%, can Shamgan safely conclude that
Russian gas is more likely to
be rejected than
other
gas
?

MISS PROFESSOR ONLY

 

·         Week 4 Case Study 1 Submission

 

If you are using the Blackboard Mobile Learn IOS App, please click “View in Browser.” 
Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. 
Instructors, training on how to grade is within the Instructor Center.  

Case Study 1: Attacking More Than Just the Enterprise
Due Week 4 and worth 60 points

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry. Read the article titled, “Verizon DBIR 2012: Automated large-scale attacks taking down SMBs” located at the following SearchSecurity link: http://searchsecurity.techtarget.com.au/news/2240147412/Verizon-DBIR-2012-Automated-large-scale-attacks-taking-down-SMBs

Write a three to four (3-4) page paper in which you:

 

1.      Evaluate the recent trend toward attacking small and medium businesses and identify the benefits that these types of businesses have which attract attackers.

 

2.      Compare and contrast the digital forensic operations of small-sized companies to large companies in terms of costs, personnel, inexperience, naivety, etc.

 

3.      Explain the common purpose of attacks on point-of-sale (POS) systems and identify why you as a security professional would have cause for concern for your customers’ POS systems.

 

4.      Assess why and how these POS systems have become a prime target for hacking groups. 

 

5.      Examine the forensics challenges that exist for investigations on POS systems.

 

6.      Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar Websites do not qualify as quality resources. 

 

Your assignment must follow these formatting requirements:

 

·         Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

 

·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

 

The specific course learning outcomes associated with this assignment are:

 

·         Outline system forensics issues, laws, and skills.

 

·         Describe and analyze practices in obtaining digital evidence.

 

·         Use technology and information resources to research advanced issues in computer forensics.

 

·         Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

 

Click here to view the grading rubric for this assignment.

 

 

 

 

 

Database and Data warehouseing Design

 This assignment consists of two (2) sections: a design document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

One of the main functions of any business is to be able to use data to leverage a strategic competitive advantage. This feat hinges upon a company’s ability to transform data into quality information. The use of relational databases is a necessity for contemporary organizations; however, data warehousing has become a strategic priority due to the enormous amounts of data that must be analyzed along with the varying sources from which data comes. Since you are now the CIO of a data-collection company which gathers data by using Web analytics and operational systems, you must design a solution overview that incorporates data warehousing. The executive team needs to be clear about what data warehousing can provide the company.

Section 1: Design Document

  1. Write a four to six (4-6) page design document in which you:      
    • Support the need for data warehousing within your company and elaborate on the best practices that the company will adhere to.
    • Create a schema that supports the company’s business and processes. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes.
    • Create an Entity-Relationship (E-R) Diagram relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. Explain your rationale behind the design of your E-R Diagram.
    • Create a Data Flow Diagram (DFD) relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
    • Illustrate the flow of data including both inputs and outputs for the use of a data warehouse. The diagram must map data between source systems, data warehouses and specified data marts. The diagram should map data between source systems, data warehouses, and specified data marts. Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Project Plan

Use Microsoft Project to:

  1. Update the project plan from Project Deliverable 2: Business Requirements, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are:

  • Summarize how information systems represent a key source of competitive advantage for organizations.
  • Develop information systems-related activities to maximize the business value within and outside the organization.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

week 3 case 1

Assignment 2: Waterfall and Agile
Due Week 3 and worth 100 points

Research agile methodologies including SCRUM and extreme programming (XP).

Write a two to three (2-3) page paper in which you:

  1. Explain waterfall methodologies and identify their relationship to the PMBOK® process groups.
  2. Explain agile methodologies and identify their relationship to the PMBOK® process groups.
  3. Analyze the need for waterfall and agile methodologies.
  4. Explain the advantages of extreme programming (XP) and analyze the advantages of its application in high-budget short-time projects.
  5. Explain the factors to consider when selecting a project management methodology (Waterfall vs Agile).
  6. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Identify how project management improves the success of information technology projects.
  • Use technology and information resources to research issues in IT project management.
  • Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

information system security

 

Grumheed Corporation

 

Dallas/Fort Worth Facility

 

 

 

Grumheed Corporation (GC), a world leader in advanced tactical drones, plans to open a facility in the Dallas-Fort Worth metroplex.  While having not settled on an exact location, ideally the facility will be within two miles of the Dallas-Fort Worth International Airport via major highway. While maintaining our original facility in Boston, the new campus will become the primary location for research and demonstration of equipment and sales.  Since our company produces state-of-the-art military equipment, this new complex must have all possible security measures.  Visitors, potential customers, current customers, support staff, design engineers and demonstration staff will all be housed in this 100,000 square foot facility. For BC/DR purposes the data warehouse will be duplicated to the Boston facility nightly.

 

 

 

This is a list of requirements facility:

 

·         Controlled access to the building for everyone.

 

·         A lobby, conference area, and sales area that needs controlled access

 

·         A highly secure area for system designers

 

·         An extremely secure area to house the data center.

 

·         Secure transfer of archival data between Dallas and Boston

 

·         Secure access to the Internet for employees

 

 

 

Please present a detailed proposal of your recommendations for physical, technical and administrative security measures for our new facility. In your proposal please recommend categories of countermeasures and the associated risks that the countermeasures mitigate. You are not expected to recommend a specific brand/model of a countermeasure. Please include a section detailing additional risks that have not been mitigated by your proposal.  Your proposal should be a minimum of 1500 words and properly site all references.