CAR202- Characteristics of an expert in my field

Instructions

Each field or industry will have its own aspects and skills that will define an expert in the field.  For this assignment, you should: 

  • Find a source (journal article, book, web blog, etc.) that addresses the specific skills and characteristics needed to be an expert and successful in that field.  Briefly (one paragraph) identify the main findings from this source, specifically the characteristics needed. 
  • Identify the experience and expertise you have that allow you to meet each suggested characteristic needed.  Frame your response as you would in an interview if you were seeking to frame yourself as an expert. 

Instructions: 

  • Your assignment should be approximately500 words in length (typically, two double-spaced pages), not counting cover page, reference list page, appendices, figures, or tables.  
  • Your assignment should include a title page and a reference list page, and be completed in Times New Roman 12-point font, double-spaced, with appropriate header, page numbers, one-inch margins, and meet all other requirements of APA Stylebook.  
  • Please use at least one appropriate scholarly reference for the basis of your paper, formatted in the most current APA format.  
  • Please refer to the rubric associated with this assignment for detailed guidance about expectations and grading.   
  • Please submit this assignment through in D2L by 11:59PM Central Time on Sunday. 

Emerging threats_4.2

Discussion: 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

paper ERM

 how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

cyberbullying: an exploratory analysis of factors related to offending and victimization

Textbook Chapter 9: Cyberbullying, Online Harassment and Cyber Stalking.

1. To what area(s) of which chapter does the work most closely relate?

2. What does(do) the author(s) set forth as their thesis in the piece?

3. What subjects does the work regard: people, entities, industries, political bodies, demographic groups, etc.?

4. What journal was it published in, and when?

5. **Key** How can you apply their work to your academic and professional understanding of DF?

6. What did the author(s) get right? Wrong? How could they have expanded/focused their scope?

· No Plagiarism 

· Should be 400 words without References.

mad discussion

  

Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(9), 195. Retrieved from https://doi.org/10.3390/fi11090195

Puchley, T., & Toppi, C. (2018). ERM: Evolving From Risk Assessment to Strategic Risk Management. HFM (Healthcare Financial Management), 1–5.

After reading the articles this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

The Relationship between Cyberbullying and School Bullying

 Textbook Chapter 9: Cyberbullying, Online Harassment, and Cyber Stalking.

1. To what area(s) of which chapter does the work most closely relate?

2. What does(do) the author(s) set forth as their thesis in the piece?

3. What subjects does the work regard: people, entities, industries, political bodies, demographic groups, etc.?

4. What journal was it published in, and when?

5. **Key** How can you apply their work to your academic and professional understanding of DF?

6. What did the author(s) get right? Wrong? How could they have expanded/focused their scope?

· No Plagiarism 

· Should be 400 words without References.

Classification Model

 Give an example of a case where you would assign higher cost to False Negative (FN) then False Positive (FP) 

One page in APA