Negotiation

 

Each student will select one of the key terms listed below and conduct a search of Campbellsville University’s online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept. Your submission must include the following information in the following format:

Key Terms:

  • Influence as it Relates to Negotiation
  • Persuasion as it Relates to Negotiation
  • Power as it Relates to Negotiation
  • Pressure as it Relates to Negotiation

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format.

Decision Support and Expert Systems

Overview:

In a meeting with your executives, your CIO expressed interest in exploring Decision

Support Systems and Expert Systems. To address this need, your IT director asked you

to write a 2-3-page white paper that he will review and submit to the executive team.

Instructions:

In this paper, you will need to develop the following points:

• List and explain the phases in decision making, and how a decision support

the system will add a competitive advantage to your hospital.

• Describe the typical software components that decision support systems

comprise and their fields of application in your hospital.

• Describe the adoption of a medical expert system, and if it could be beneficial to

the doctors at your Hospital.

Requirements:

• This assignment is a paper consisting of 2-3 pages, using APA formatting and

citations.

• Include two references.

AI MIDTERM EXAM

You must take the online exam on July 28 between 9am and 5pm. It is open book and open note. You will have 2 hours to take the exam once you begin. 

Access Control – Dis2

Discuss how business use Access Control to protect their information, describe the how a business will the Control Process.

 It must be at least 500 words and must have 2-3 references. APA format with turnitin report needed.

discussion 09/22

 

Topic: Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee. For each type of stakeholder, provide the reasons for inclusion and the unique aspects of vision that you believe each of these stakeholders will bring to the committee.

300 words.  100 words conclusion.

linux

 What makes something a script versus a program?  Based on your research, describe what you think the differences are between a script and a program. What is each item better at? Describe a situation where you would use each. 

cc15

 In 500 words describe Cloud Security Myths with 3 references. 

scenario 4

Due Week 4 and worth 100 points

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach. 
  2. Identify the common purpose of attacks on point-of-sale (POS) systems. 
  3. Assess why and how these POS systems have become a prime target for hacking groups. 
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

Clustering

Need to research the following questions and Write at least 2 paragraphs with references.

-How do search engines (you can take google as case study), utilize clustering? 

-Why?

-Which type of clustering

Each paragraph should have minimum of 180 words. APA formatting