Paper analysis

 Read the attach paper and write a comprehensive summary/review of the paper as follows: 

  • Make sure to identify strength and weakness this research paper
  • Minimum of 500 words 
  • Plagiarism free & Quoting Free
  • Upload your response as pdf/word file 
  • This assignment should be in APA format and have to include at least two references ( from the paper reference as needed to support your review/summary) 

Graduate Research & Critical Analysis Feb 3

  1. STOP: (1) Have you watched the HW video on APA 7 Basics and Cover Page? (2) IF you were absent, have you watched the class recording? Do not continue to the assignment until these things are complete

    ASSIGNMENT
    Step 1, Brainstorm: Think about your field of study as a master’s student. Use one of the two methods taught in class and find two news articles that report on relevant problems related to the industry associated with your master’s degree program (think about scandals within the last 5 years). Come up with two examples using the format below in a simple Word document, using APA 7 Basics and an APA 7 cover page learned through the HW video (see p. 20 in Foundations for a sample cover page)

    Step 2, Create your Word Document and Answer Questions (it should look similar to p. 5 in Foundations):

    FOR EXAMPLE: If my major is public health or even education, I would come up with something like Issue/Problem 1 below (MPH students, you cannot use this as your own). We have started one together in class, so you must complete what you started in class and find a second research problem proposal:

    Issue/Problem 1: Depression and anxiety among young adults 
    1) People Involved: College students, parents
    2) Link to Article: https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/college-students-and-depression
    3) My Research Question: What have researchers learned about the impact of COVID 19 on depression and anxiety among young adult students?

    I would then fill out my second Problem proposal below: 

    Issue/Problem 2:
    1) People Involved: 
    2) Link to Article: 
    3) My Research Question: What have researchers learned about

    Grading:
    Cover/Title Page = 40 pts
    Issue/Problem 1 = 30 pts
    Issue/Problem 2 = 30 pts

Submission Content

SECURITY POLICY & STANDARTS

Please write a 1-2 page synopsis on the following topic.

Security awareness training is often the first view a typical user has into information security. It’s often required for all new hires. Think of it as the first impression of management’s view of information security. This is management’s opportunity to set the tone. Most individuals want to do a good job, but they need to know what the rules and expected behavior are. That is one of the purposes of a security awareness policy.

Answer the following question(s):

1. What do you think are the two most important practices that should be incorporated into a security awareness policy?

2. Why do you rank them so highly?

Activity to do

“Memory errors. A help desk supervisor wrote the following in an email :“As our users’ PC sage, we are seeing indications that some of the RAM modules are beginning to experience intermittent failures. Microsoft apparently has a Windows Memory Diagnostic utility program that is available free. Please research the memory utility program, and let me know whether itis easy enough to use that we could run it on all our users’ PCs. 

 Write a paragraph (at least 4 sentences or more, not run-on) at college-level (can check WORD software for terminology used to see if it’s for 12 years (high school senior)  or college-level (13th or 14th or beyond year)  to respond to the supervisor’s request. Write thorough explanation for a non-computer user (person that does not understand computers and does not know software) to be able to follow it. Of course, you can use captured screens of photos/pictures but no goofy clipart. 

Homework

Find a criminal case that involved Digital Forensics. Using WORD, 300 words or more describing the case and the how digital forensics were used  in the investigation. 

Research Paper(Report)

Report should include:

1.Title 2.Abstract 3.Introduction 4.Previous Work 5.Your Work 6.Conclusion 7.Bibliography.

Expected 10 page report not including the tilte page or bibliography.

(double spaced,12 pt font)

network administration

The Open Web Application Security Project (OWASP) is a nonprofit foundation dedicated to helping people understand and improve the security of software. One of their projects it the OWASP Top Ten Web Application Security Risks found https://owasp.org/www-project-top-ten/Links to an external site. .

For this discussion you will choose one of the Top Ten Risks and give a brief overview and why you think i tis important. Then do some research for a breach that occurred because of this vulnerability. Give a brief summary of the breach and how they could have mitigated the attack.

MKT -4

 

1. Briefly outline Maslow’s theory of the hierarchy of needs. What need levels are addressed by:

  • Being promoted from operator to supervisor.
  • Setting a new record for individual performance.
  • Being selected to attend a special training course.

2. In what ways did Frederick Herzberg’s research concerning employee motivation correlate with Maslow’s hierarchy of needs?

3. Of the various leadership approaches discussed in the chapter, which one would you most prefer your boss to use in working with you and your group. Explain your answers.