Edudorm Facebook

Topics and Questions We Can Help You To Answer:
Paper Instructions:

The main idea is the history of cyber security. The introductory paragraph should identify the issues to be discussed in the paper by introducing the main topics and explaining to the readers what area(s) the research will address.  The paper must be written in APA format (based on the sixth edition) and include a minimum of five references, cited correctly in my paper. The paper should address the main topic that i have selected and introduce thought-provoking elements into the paper based on the exhaustive research into this topic. Abstract: 150–250 words long using APA format

107 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Padgett-Beale – a world leader in the hospitality industry and a big guest house. Company HistoryElmer and Robenia Padgett’s first hotel, Robenia’s Guest House,  opened in 1925 with six family suites (two per floor), a tea room, and a formal dining room. The guest house primarily served wealthy families who relocated to the seashore for the summer to escape the heat in New York City. This property provided amenities and services matching those of rival long-stay hotels in major cities along the East Coast. The second and third properties, Padgett’s Hotel and Padgett’s Beach House,  were acquired in 1935. Flintom’s Tavern, a landmark restaurant, and entertainment venue, was added to the Padgett properties portfolio in 1940.

You hired a management intern and part of cybersecurity management and you have been asked to draft a letter to guests to address concerns about the impacts of possible cyber attacks. This particular letter should reassure guests that the company is taking positive steps to protect guest privacy. The guests' concerns extend beyond the privacy of information in databases. There have been news reports detailing situations where hackers have attacked internal building monitoring and control systems to spy on guests and invade their privacy.

In order to write an effective notification letter, it is first necessary to understand the required perspective for such a letter.

From a technical perspective, this type of attack is a data security problem because the attackers are stealing data by attacking at the point of creation (data at rest) and then along the transmission paths (data in transit).  The impact of this type of attack is a loss of confidentiality.

From a people perspective, this type of attack is viewed as an attack on the privacy of guests and is categorized as a loss of privacy.

Managers need to address this problem from both perspectives. With internal technical staff, the conversation would revolve around data security. But, with guests and Guest Relations staff, the conversation needs to address concerns about the possible loss of privacy.

Secondly, we must consider the required "tone" for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient's feelings. Empathy and emotional intelligence are important leadership skills for managers.

Having empathy and/or acting in an empathetic manner (aware of and sensitive to the emotions of guests and customers), allows a manager to respond appropriately when a cyberattack occurs.  As you write this letter, you will need to find a balance between addressing the emotional aspects of a cyberattack (need for a supportive and calming response -- less information may be best) and the need to develop trust by providing information about a situation which can invoke fear and concern.

After you read this week's readings on data security, read this definition of Emotional Intelligence and this discussion article about What Emotional Intelligence Is and Is Not. Then, read about three types of empathy https://www.huffingtonpost.com/entry/types-of-empathy_us_56f171cde4b03a640a6bcc17.

Next, read one or more of these articles about a cyber attack that affected hotel operations and created fear and concern among guests and employees.

1. Hackers use ransomware to target hotel guests' door locks

2. Hackers are using hotel Wi-Fi to spy on guests, steal data

3. 20 hotels suffer hack costing tens of thousands their credit card information

Using what you've learned about data security AND emotional intelligence, draft a letter that Padgett-Beale could use to inform and calm its guests should a similar cyberattack (door locks, guest WiFi access, or credit card Point-of-Sale breach) affect one of the company's hotels properties. Your draft letter will also be used to train employees in how they can and should respond to guest concerns.

More references 

1. https://www.isaca.org/Journal/archives/2010/Volume-6/Documents/jpdf1006-an-introduction-to.pdf

2.https://www.datamotion.com/best_practices_-securing_data_at_rest_in-use_and_in_motion/ 
3. https://www.psychologytoday.com/us/basics/emotional-intelligence

4. https://www.huffpost.com/entry/types-of-empathy_n_56f171cde4b03a640a6bcc17

5. https://arstechnica.com/information-technology/2016/08/20-hotels-suffer-hack-costing-tens-of-thousands-their-credit-card-information/

655 Words  2 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Cybersecurity professionals have critical roles in the development and maintenance of cybersecurity training on the organizations they serve. Special consideration must be given to the particular requirements of their organizational requirements. This Assignment will help reinforce this role.

49 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:



You will write a paragraph with context introducing the concepts from the attached file , followed by a question that is not from the text book or too generic for others to answer based off the information you have provided. The question can be interesting, controversial, or both (make your question attractive for others to reply to your question and initiate a conversation)



This discussion board requires

1.  Posting at least one structured question: provide a paragraph with the context introducing the concept(s), followed by a question that either be interesting, controversial, or both (make your question attractive for others to reply to your question and initiate a conversation)

2.  ]

3.  Using an external reference, properly cited, to support your reply to question(s).

Activity:

Module 2, which includes chapters 4 and 5, focuses on the planning stage of the systems development life cycle. Chapter 4 introduces you to the first phase of the systems development life cycle, identifying and selecting systems development projects. The premise is that organizations benefit by following a formal process for identifying and selecting projects that align with its strategic objectives. During the first step of information systems planning, a senior manager, a business group, an IS manager, or a steering committee identifies all possible systems development projects that an organizational unit can undertake. During the second step, projects are classified and ranked according to some criteria that are important to the organization. During the third step, those projects deemed most likely to yield significant organizational benefits, given available resources, are selected for subsequent development activities.

Next, Chapter 5 introduces project initiation and planning. Project initiation includes those activities that assist in organizing a team to conduct project planning. During project initiation, one or more analysts work with a customer to establish work standards and communication procedures. Project planning is the process of defining clear, discrete activities and the work needed to complete each activity. An important aspect of the project initiation and planning process focuses on the assessment of a project’s feasibility and risk. Chapter 5 describes several types of feasibility, including economic, technical, operational, schedule, legal and contractual, and political.

Based on the previously discussed context, you will post at least one question and respond or comment to at least one question or comment posted by other participants in the discussion board. Your question(s) or comment(s) should go beyond the conceptual domain but also describe or explore how this knowledge can be applied to your current or future professional activities or endeavors.

I expect your posts to be original in all aspects. Consequently, you should not use questions from your textbook for your posting. Further, use secondary references that provide additional information or support a better understanding of chapters covered in the module.

470 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

The positive effects artificial intelligence has on the economy.

20 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:
Research existing theories for databases and data management. Identify common theories, and explain if these theories have evolved over time. Then, research how these technologies are used in practice. You will likely have to include business journals and practical application of the concepts. 

Choose at least one major theory for further gap analysis. Write an assessment outlining the following:

1. Explain the theory that was chosen.
2. Provide your analysis of the gap between theory and practice (industry literature can help show the state of practice and help you determine the gaps compared with the scholarly literature).
3. Outline the root cause of this gap and include the effect of the gap. Who or what does it impact? Is it a positive or negative impact? Provide examples to support your findings.

NOTE: Do not select database normalization for your theory.

Support your assessment with a minimum of five scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including seminal articles, may be included.

Length: 6 pages

Resource: Pathak, N. (2008). Database management system. [electronic resource]. Mumbai [India]: Himalaya Pub. House.

194 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

MAIN POST 


For this discussion board, provide an overview of each of the following types of imaging/assessment measures:
1. Computerized Tomography (CT)
2. Magnetic Resonance Image (MRI)
3. Functional Magnetic Resonance Image (fMRI)
4. Positron Emission Tomography (PET)
5. Single Photon Emission Computed Tomography (SPECT)
6. Electroencephalogram (EEG)
Which imaging technique would you select if you suspected a brain tumor? Why?
The following article may be helpful in answering this discussion board:
Camprodon, J.A., & Stern, T.A. (2013). Selecting neuroimaging techniques: A review for the clinician. The Primary Care Companion for CNS Disorders, 15(4), 12f01490. doi: 10.4088/PCC.12f01490
(Links to an external site.)
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3869600/
(Links to an external site.)
**Discussion board posting requirements: For each discussion board, be sure to have one main post of at least 400 words and two reply posts of at least 200 words in order to demonstrate sufficient depth to your responses. To receive the highest grade for the discussion board posts, be sure to integrate the textbook as well as additional scholarly sources to support your contributions. Take a look at the empirical literature and include peer-reviewed journal articles to support your posts. Please have your posts submitted on at least two separate days (e.g., don't post your main post and reply posts all on the same day). This will be worth one point per discussion board and falls under the "Advances Conversations" portion of the discussion board rubric. This helps to spread out the conversation over the course of the unit, and it gives every student the chance to respond to the discussion at a time convenient to their schedule (instead of most of the discussion occurring on the due date). Reply posts can be to either your peers' posts or to the instructor’s posts.








 RESPONSE TO THE POST 


Manage Discussion Entry 

Computerized tomography:
According to the assigned book in this class it is commonly known as a CT scan where the "patient's head is placed in a large doughnut-shaped ring. The ring contains an X-ray tube and, directly opposite it (on the other side of the patient's head), an X-ray detector" (Carlson & Birkett, 2016, p. 130). There is an x-ray beam that scans the head in every angle. The information gathered from these beams are made into pictures of the skull. The goal of this method of brain scanning is to find the location of a lesion in the brain.
Magnetic Resonance Image (MRI)
This is very similar to a CT scan by finding the location of lesions in the brain.  The MRI finds slices in the brain, but with better detail in contrast to the CT scan. They use a magnetic field and radio waves to find the lesion location. Instead of using x-rays, the MRI uses a magnetic field . Here the MRI analyzes the signal taken by the magnetic field and then pictures are prepared of slices of the brain.
Functional Magnetic Resonance Image (fMRI)
An fMRi records the metabolic activity happening in regions of the brain. This type of scan measures measures the brain's regional metabolic activity of living. It detects blood flow and oxygen levels.
Positron Emission Tomography (PET)
This type of scan "visualizes activity of brain regions that are metabolically active in a living brain" (Carlson & Birkett, 2016, p. 141). The PET uses radioactive 2-DG as well. This type of scan also shows how one's tissues and organs function and also has the ability to show traces of certain diseases.
Single Photon Emission Computed Tomography (SPECT)
This type of scan looks at blood flow to tissues and organs throughout the body. The types of tracers used are  iodine-123, technetium-99m, xenon-133, thallium-201, and fluorine-18. 
Electroencephalogram (EEG)
These can often be described as writings of electricity from the head. This is often used to watch the stages of sleep and to diagnose epilepsy. This is because sleep patterns are associated with electrical activity. This test happens when an experimenter attaches electrodes to the scalp for the purpose to monitor the brain's activity.

References
Lam, P. (2018, July 24). Mri scans: Definition, uses, and procedure. Retrieved January 21, 2020, from https://www.medicalnewstoday.com/articles/146309.php
(Links to an external site.)
Devlin. (2018, October 08). What is functional magnetic resonance imaging (fmri)? Retrieved January 21, 2020, from https://psychcentral.com/lib/what-is-functional-magnetic-resonance-imaging-fmri/
(Links to an external site.)
Mayfield Brain & Spine. (n.d.). SPECT scan. Retrieved January 21, 2020, from https://mayfieldclinic.com/pe-spect.htm
(Links to an external site.)
Carlson R., & Birkett, M. A. (2017). Physiology of behavior. Harlow: Pearson

772 Words  2 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

What considerations should you make in your first round of coding your data? How will you determine what data should be coded and how?



Do you have experience that answers the question?

At different points in your career, would you have answered this question differently? Why?



Include your own experience as well as two citations that support your assertions as sourced from peer-reviewed academic journals, industry publications, books, and/or other sources. Cite your sources using APA formatting.

88 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:
.
Your Assignment
You are the manager of a large data processing project. Your company, Systems Inc., worked very hard to obtain a contract with Big Bank to do the conversions from its recent acquisition, Small Bank. The bank met with several companies to discuss who would do the best work on the contract. During your meeting with Big Bank, you told them that you had "never missed a conversion deadline." At the time, your company had never missed a conversion deadline, but the company had only done three conversions. You also told them that your data processing systems were the fastest around. After months of negotiation, Big Bank signed the contract. The president of Big Bank said, "We like fast, and you guys are fast. We choose you."
You started work on the data conversion immediately (ahead of contract). According to the contract, your team was responsible for ensuring that the new bank's data were converted to Big Bank's data processing system. The contract involved six large conversions. The first involved converting Big Bank's savings accounts, the second its checking accounts, the third its investment portfolio, the fourth its credit cards, the fifth its mortgage portfolios, and the sixth its large business loans. Your team completed four of the six conversions without a problem. The fifth task, the largest and most important, has encountered numerous problems. Some problems have been based on personnel issues on your part and other issues have been based on the bank's failure to provide you with necessary information. One issue resulted when the conversion was delayed for over a week. The data to be converted were formatted differently than the bank's previously provided specifications. For that reason, the data conversion fields needed to be changed. A provision in the contract required your company to receive four people's approval before making any changes to the conversion data fields, and one of those four people, Glenda Givealot, was out of the country doing missionary work in an area of the world that did not have cell phone reception. Another issue resulted when the conversion was supposed to occur. Because of the change in the timeline, the conversion schedule had to change. The weekend the conversion was rescheduled to occur, an ice storm struck the state where your data processing computers were housed. Your facility lost electricity for 3 days and the conversion was delayed again until power could be restored.

The bank’s president, who is a known hothead, was furious. He called you after power was restored and yelled,
“We are rescinding this contract!”
He also threatened to take the case to court to seek damages.

Systems Inc. President 

Your company president wants this situation resolved amicably. He also wants to maintain the contract with the bank, because he sees the potential for a large amount of business with the bank in the future if this contract proves successful. Corporate counsel believes that the bank just needs to be shown that it is out of compliance with the contract just as we are and that both parties are to blame. He wants you to start negotiations with the bank to modify certain provisions of the contract to make expectations clearer. 

546 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Scenario Summary: 

This scenario covers a contract dispute situation. The contract in question is an agreement between Systems Inc. and Big Bank. Please review the contract located in Scenario Summary of the “You Decide” page to familiarize yourself with the specifics of the contract.

Your Role/Assignment:

You are the manager of a large data processing project. Your company, Systems Inc., worked very hard to obtain a contract with Big Bank to do the data conversions from their recent acquisition, Small Bank.  The bank met with several companies to discuss who would do the best work on the contract. During your meeting with Big Bank, you told them that you had “never missed a conversion deadline.” At  the time, your company had never missed a conversion deadline, but the company had only done three conversions. You also told them that “your data processing systems were the fastest around.” After months of negotiation, Big Bank signed the contract. The President of Big Bank said, “We like fast, and you guys are fast. We choose you."

You started work on the data conversion immediately (ahead of contract). According to the contract, your team was responsible for ensuring that the new bank’s data was converted to Big Bank’s data processing system. The contract involved six large conversions. The first involved converting Big Bank’s savings accounts; the second,  its checking accounts;  the third,  its investment portfolio;  the fourth,  its credit card operations;  the fifth,  its mortgage portfolios;  and the sixth,  its large business loans. Your team completed four of the six conversions without a problem. The fifth task, the largest and most important, has encountered numerous problems. Some problems have been based on personnel issues on your part and other issues have been based on the bank’s failure to provide you with necessary information. One issue resulted when the conversion was delayed for over one week. The data to be converted was formatted differently than the bank’s previous specifications provided.  For that reason, the data conversion fields needed to be changed.  A provision in the contract required your company to receive the approval of four individuals  before making any changes to the conversion data fields, and one of those four people, Glenda Givealot, was out of the country doing missionary work in an area of the world that did not have cell phone reception.  Another issue arose when the conversion was supposed to occur. Because of the change in the timeline, the conversion schedule had to change. The weekend the conversion was rescheduled to occur, an ice storm struck the state where your data processing computers were housed. Your facility lost electricity for three days, causing the conversion to be delayed once again.  




Questions:

Question: (17 points) 

Can Big Bank’s President rescind the contract?  Under what circumstances can a contract be rescinded by either party?  What facts have to be alleged and proven?  What is the result of a contract that is rescinded?

Solution:



Question: (16 points) 

Big Bank’s President also threatens legal action.  What potential causes of action could you foresee him bringing in court?  Would he be successful?  Why or why not?  What arguments could Systems Inc. raises in its defense?  What are Big Bank’s potential damages?

Solution:



Question: (17 points) 

Review the facts provided and the sample contract.  What provisions of the contract could you cite to support an argument that it is not in Big Bank’s best interest to rescind the contract?  What facts could you cite to support an argument that Big Bank be responsible for some of these issues and/or not in compliance with the contract?

Solution:



Question: (16 points) 

In this situation amicable resolution of problems is greatly preferred by your company.  Would this be true in all contract disputes? In what situations would you decide to  litigate?  Why would you decide to move to litigation rather than attempt to reach an  amicable resolution?

Solution:



Question: (17 points) 

There are 3 types of contract performance: 1)complete performance;  2)  substantial performance;  and 3)  material breach.  Describe the differences (and similarities) among the three, and explain some of the legal ramifications for one or more of these types of performances. (For example, what happens if one party performs completely but the other party performs only substantially?)  Give examples from outside readings or experiences in your career or personal business life.

Solution:


Question: (16 points) 

What are the two most important concepts from this exercise that will help you in future contract negotiations?

Solution:




Solution answers must be at least one half page each.  Show each question on a separate page.  Non-conforming papers grade will be reduced by 5 points per page maximum.

786 Words  2 Pages

Questions and Topics We Can Help You To Answer:

The Challenges Facing South African Urban WISP's

16 Words  1 Pages

Questions And Topics We Can Help You To Answer

Technology In Civilization

12 Words  1 Pages

Questions and Topics We Can Help You To Answer: 

HYPERLOOP TRANSPORTATION TECHNOLOGY

12 Words  1 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...