Archive for February 20th, 2020

Unit 4 Assignment

Instructions

In this unit, you became familiar with sources of municipal solid waste  (MSW), beneficial uses of MSW, and MSW landfills. 

For this assignment, you will write an essay that addresses the  components  listed below.     

Discuss   the sources and beneficial uses of municipal solid   waste.    

Describe   the differences between garbage, rubbish, and trash.    Elaborate   on the four characteristics of optimum routing of MSW   collection   trucks.   

 Explain   the purpose of transfer stations.    Provide   two positive and two negative aspects of incinerators.   

 Describe   the purpose of composting.    

Discuss   four differences between dumps and landfills.   

 Address   the following question: If each person in a city of 20,000   people generates 5   pounds per day of MSW, how many pounds of MSW are   generated in a year in the   city?    

Address the following question: In a   different city, if the landfill   volume required per year is 300,000   m3, and the average fill depth is 15 m,   what is the required   landfill area (m2) per year? 

Your essay should flow smoothly from topic to topic with thoughtful  transitions. It should be at least three pages in length, not counting the  references page; a title page is optional. Support your essay with at least two peer-reviewed articles from the CSU  Online Library. The articles should be no more than 20 years old. Feel free to  use the  textbook and other sources as references in addition to your two CSU  Online Library sources. Be sure to properly cite and reference all sources, and  use APA format. 

Supply Chain Risk Analysis

  

Project #5: Supply Chain Risk Analysis

For this project, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. To begin, you will need to explore through the readings the concepts of global supply chains and global cooperation for cross-border trade in goods and services. Then, you will need to investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1.  Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

a.  

b.  

c.  

d.

e. Information and Communications Technology Supply Chain Risk Management (ICT SCRM)  

2. Read the following articles / documents which focus on international cooperation and capacity building for cybersecurity:

a.  

b.  

c.  

3. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

a. (download to your computer then open document to read/review the checklist)

b.   

4. Research best practices and recommended strategies and approaches for managing global supply chain risk

a. Best Practices in Cyber Security Supply Chain Risk Management  

b.  Supply Chain Cybersecurity: Experts on How to Mitigate Third Party Risk  

c. 5 Cybersecurity Best Practices for your Supply Chain Ecosystem  

Write

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity related risks in global supply chains for products and services. Your introduction should include a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry. 

2. A supply chain risks section in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services. 

3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process. This section should include discussion of political, economic, and social factors which impact management of supply chain risk.

4. A best practices section in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks. 

Submit For Grading 

Submit your work in MS Word format (.docx or .doc file) using the Project 5 Assignment in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5-8 page paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. 

3. Your paper should use standard terms and definitions for cybersecurity. 

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the professional appearance requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.  

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignments page count. 

6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.  

7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 

Rubric

Introduction

10 points

Provided an excellent overview of the problem of supply chain risk as it pertains to the cybersecurity industry.  Appropriately used information from 3 or more authoritative sources.

Supply Chain Risks

20 points

Provided an excellent discussion of specific aspects of supply chain risks in the cybersecurity industry. Identified and discussed 5 or more specific examples of supply chain risk that have or will impact cybersecurity products and services. Appropriately used and cited information from 3 or more authoritative sources.

Due Diligence for Procurement & Acquisition

15 points

Provided an excellent discussion of due diligence as a risk management strategy for acquisitions and procurements of cybersecurity products and services. Addressed requirements to investigate suppliers prior to entering into contracts for products or services. Provided 5 or more examples of cybersecurity related questions that should be asked during the due diligence process. Appropriately used information from 3 or more authoritative sources.

Best Practices for Managing Global Supply Chain Risks

15 points

Provided an excellent discussion of the role that best practices should play in addressing global supply chain risks for cybersecurity products and services. Provided 5 or more examples of best practice recommendations and an evaluation of the expected benefits from implementing each of these practices. Appropriately used information from 3 or more authoritative sources.

Summary and Conclusions

10 points

Provided an excellent summary and conclusions section which presented a summary of findings including 3 or more reasons why global supply chain risk is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services.

Addressed security issues using standard cybersecurity terminology

5 points

Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the security issues. Appropriately used 5 or more standard terms.

Professionalism Part 1: Consistent Use and Formatting for Citations and Reference List

5 points

Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. Reference list entries and in-text citations are consistently and correctly formatted using an appropriate citation style (APA, MLA, etc.).

Professionalism Part 2: Organization & Appearance

5 points

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Professionalism Part 3: Execution

15 points

No formatting, grammar, spelling, or punctuation errors.

Business Law

What are the major types of bankruptcy? Explain the basic purposes and procedures of each major type of bankruptcy? Discuss what happens to a debtor’s assets and liabilities during bankruptcy? What debts are not dischargeable in bankruptcy? What would you recommend a creditor do to protect itself from a debtor filing bankruptcy? What are the consequences of filing bankruptcy? Finally, give examples of notable companies that filed bankruptcy and discuss what happened to those companies? 

*Please refer to the Grading Criteria for Comprehensive Learning Assessments (CLAs) on page 10 of the syllabus for specific guidelines and expectations

CRM- Module 7

 Must post first.

Instructors are to develop their own respective course materials. Hard copies and websites used and provided in this class are not to be shared with instructors in other classes.

Please visit and fully review (including clicking on and viewing the embedded FBI Portland Holds Threat Response Training) the entire FBI site at:  and the hyper-link at the end and carefully and closely read the Navy Yard Shooting After Action Report at:

It may be neccesary to cut and paste the web addresses and search in order to access the above two sites.

This is a two part discussion assignment.

First, After reviewing the web documents and the Webliography videos. Draw upon your critical and strategic thinking. Explain separately and distinctively how the training is critical to (1) Preparedness (2) Prevention – Mitigation (3) Response, and (4) Recovery. Be specific – do not generalize and include cited readings from your textbook as well as the web documents provided above in formulating your four responses (note the cycle printed on the cover of your textbook).

Secondly, Separately discuss the learning points you derive from the observations, summaries, and recommedations based upon the observations, in the Navy Yard After Action Report.

The Navy Yard case was not a terrorist attack but the same response factors would apply in cases involving terrorists, e.g., San Bernardino. 

You must start a thread before you can read and reply to other threads 

Gender Violence in Universities

Policy Brief must be formatted as per the attached: HEtools_briefing document

Use your interdisciplinary perspectives and skills to write ONE MAXIMUM TWO PAGE brief paper

BN should be maximum TWO PAGES. Broadly cover the following points:

Use current evidence to explain the basics of the policy issue to stakeholder(s). What is this policy area all about? What are the stakes in this policy area for the stakeholder(s)?
What are the main policy choices for the stakeholder(s)? Sketch out at least two different policy options for the stakeholder(s).
Which policy position do you believe the stakeholder(s) should take and why? Support your position with current and reliable facts and data.

1. Explain the core ideas of the policy issue to stakeholder(s). What is this policy area all about? What are the stakes in this policy area for your stakeholder?
2. What are the main policy choices for your stakeholder? Sketch out at least two different policy options for your stakeholder.
3. Which policy position do you believe your stakeholder should take and why? Support your position with facts and data. 
BN development will be described in detail during class. We will also examine at least three existing briefing notes, with their public policy context. Excellent online resources are provided on Moodle. We will also use some class time to begin the BN development process. 
Note on Sources: Make sure your BN demonstrates and that you tell your stakeholder where you got the informationinclude superscript references in the text of the BN and a matching numerical reference list at the end of your BN. Use at least six current sources, of which at least two must be scholarly (academic journal article, recent textbook). 

NRS-429VN0500 Family Centered Health Promotion.

Select an ethnic minority group that is represented in the United States (American Indian/Alaskan Native, Asian American, Black/African American, Hispanic/Latino, Native Hawaiian, or Pacific Islander). Using health information available from Healthy People, the CDC, and other relevant government websites, analyze the health status for this group.

In a paper of 1,000-1,250 words, compare and contrast the health status of your selected minority group to the national average. Include the following:

  1. Describe the ethnic minority group selected. Describe the current health status of this group. How do race and ethnicity influence health for this group?
  2. What are the health disparities that exist for this group? What are the nutritional challenges for this group?
  3. Discuss the barriers to health for this group resulting from culture, socioeconomics, education, and sociopolitical factors.
  4. What health promotion activities are often practiced by this group?  
  5. Describe at least one approach using the three levels of health promotion prevention (primary, secondary, and tertiary) that is likely to be the most effective in a care plan given the unique needs of the minority group you have selected. Provide an explanation of why it might be the most effective choice.
  6. What cultural beliefs or practices must be considered when creating a care plan? What cultural theory or model would be best to support culturally competent health promotion for this population? Why?

Cite at least three peer-reviewed or scholarly sources to complete this assignment. Sources should be published within the last 5 years and appropriate for the assignment criteria and public health content.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. 

You are required to submit this assignment to LopesWrite. Please refer to the directions in the Student Success Center.

Psychological Analysis of Walter Sickert

Psychological Analysis of Walter Sickert
: a 1000- to 1200-word analysis of one of the Jack the Ripper
suspects, Victorian actor and artist Walter Sickert. You will interpret Sickerts personality and behavior
using a documented psychological theory, such as Freuds tripartite psyche, Ulric Neissers five kinds of
self-knowledge, or Erik Eriksons psychosocial development, among others. The ability to analyze human
personality and behavior using a psychological theory can open spaces for communication between
individuals from diverse backgrounds because it perhaps makes us more aware of how humans are
impacted by, and also interact with, social and physical environments. You might need to read the book Portrait Of a Killer Jack The ripper Case Closed by Patricia Cronwell. Ill provide you with anything you dont understand or if you have questions.

Psychological Analysis of Walter Sickert

Psychological Analysis of Walter Sickert
: a 1000- to 1200-word analysis of one of the Jack the Ripper
suspects, Victorian actor and artist Walter Sickert. You will interpret Sickerts personality and behavior
using a documented psychological theory, such as Freuds tripartite psyche, Ulric Neissers five kinds of
self-knowledge, or Erik Eriksons psychosocial development, among others. The ability to analyze human
personality and behavior using a psychological theory can open spaces for communication between
individuals from diverse backgrounds because it perhaps makes us more aware of how humans are
impacted by, and also interact with, social and physical environments. You might need to read the book Portrait Of a Killer Jack The ripper Case Closed by Patricia Cronwell. Ill provide you with anything you dont understand or if you have questions.

Nurses and Negotiation

Read the article in the link below
https://www.nurse.com/blog/2013/10/10/nurses-and-negotiation-what-you-need-to-know/

Answer these questions:
1. Identify and briefly discuss your views on these pointers. 
2. Do you agree with the author’s point of view? Why or why not? 
3. Which ones do you feel are really practical for nurses and which ones aren’t?  Provide a rationale.
4. Lastly,  add your own pointer for the nurse.  Why did you add this one?

Finance

1. Summarize the points/argument in Ross (1986) in one or two carefully written paragraphs.

2. Summarize the points/argument in Kritzman (2017) in one or two carefully written paragraphs.

3. Summarize the points/argument in Lopez de Prado (2017) in one or two carefully written paragraphs.

4. List two conceptual points on which the authors largely agree, and explain in a paragraph each.

5. List two conceptual points on which the authors largely disagree, and explain in a paragraph each.

6. Provide your own takeaway conclusions from these articles in a well-organized paragraph or two.

error: Content is protected !!