Business Ehics all questiones

4.How would you describe those factors that determine the tone at the top.(550 words)

5. How would you explain the correlation between the amount of corruption in a country and economic development (550 words)

 6. Discuss the risks of avoiding confrontation of a problem employee (550 words)

7.Stanford University medical researchers conducted a study on the correlation between the use of fertility drugs and ovarian cancer.  Their study, published in the American Journal of Epidemiology, concludes that the use of the fertility drugs, Pergonal and Serophene, may increase the risk of ovarian cancer by three times.  The lead author of the studies, Professor Alice Whittemore, stated, “Our finding in regard to fertility drugs is by no means certain.  It is based on very small numbers and is really very tenuous.”

FDA Commissioner David Kessler would like the infertility drug manufacturers to disclose the study findings and offer a warning on the drug packages.  He notes, “Even though the epidemiology study is still preliminary, women have a right to know what is known.  We’re not looking to make more of this than there is.”

If you were a manufacturer of one of the drugs, would you voluntarily disclose the study information(1100 words)

8. Explain the impact of private equity firm acquisition of manufacturing and retail firms (550 words)

Research Paper on ERM

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. 

This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

1) Introduction – What is an ERM?

2) Why Should an Organization Implement an ERM Application?

3) What are some Key Challenges and Solutions to Implementing an ERM?

4) What is Important for an Effective ERM?

5) Discuss at least one real organization that has been effective with implementing an ERM framework/application.

6) Conclusion – Final thoughts/future research/recommendation

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements: 

  • Be approximately seven pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support answers with the readings from Enterprise Risk Management, and at least FIVE scholarly journal articles to support positions, claims, and observations. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

ERM Research Topics

Please Provide the Following Topics and Provide 250 words for Each question. you can use the attachment as a reference

 

1) Using the Chapter 27 Case Study, Nerds Galore, develop a Risk matrix for the HR-related risks on p. 532.  For each of the Risks in your matrix justify your decision as to their placement on the Risk matrix.

2) Embedding Strategic ERM into Strategic Planning is an important means to implement ERM for an organization.  Develop a Cause and Effect (Ishikawa) chart that would show the factors needed to make a decision to include ERM in Strategic Planning.  Provide a description explaining your chart?

3) Using the case study from Chapter 14 on Zurich Insurance, explain how Zurich’s Capital Management Program supports ERM and provide examples of where Zurich created new value with their ERM program?

4) What are at least 3 Traditional Risk Management practices that are included in ERM?  Clearly define the traditional risk management practice and how it fits with ERM.  Adequate support including applicable case study examples from your text can be applied.

5) Describe how Important Enterprise Risk management in the Information Technology Industry or Organization and things to learn from ENterprise Risks management

Grading:

Each question is graded on content, how well you address the question, and on good academic writing as follows:

1) 15 points on question response content (written word, diagrams, etc.)

2) 5 points on maintaining focus by keeping to the question, its content, and not providing unneeded material.

3) 5 points on good collegiate academic writing.

Discussion

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

block chain analysis

 

Critical Analysis Paper

Follow the links below for the journals and complete the following questions for each link. Please use one document for both journals. 

Paper 1:

Link: https://www.sciencedirect.com/science/article/pii/S0736585318306324

Note:

Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Please copy each question below and provide your answers:

Paper 2:

Note:

Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Please copy each question below and provide your answers:

discussion question

  500 words

1. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

2. list and briefly describe the nine-step process in conducting a neural network project.

Final project – Ethical hacking

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.