Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

Legislated Privacy Concerns

 

Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in you OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Errors Failures and Risks

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

 

Required Readings

From A Gift of Fire by Sara Baase and Timothy M. Henry:

Chapter 8 – Errors, Failures, and Risk

3 pages

 

As a Digital Forensic Analyst, we must be ready for any incident that may arise…  What you include in your jump bag or go bag?  From what you have read in the text as well as anything you may know concerning these go kits, what would you include in your personal go kit? 

Write a 3-4 Page Pager.  Please, use APA style formatting for this assignment.  Please, include any references that you may refer to in APA citing rules…  For more information, please visit  https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html 

Here is an APA Sample of what I expect all your papers to look like.

APA_Student_Sample_Word.doc 

Note: This paper, and similar course assignments, will automatically be checked through Safe Assign, a service that checks your work for improper citation or potential plagiarism by comparing it against a database of web pages, student papers, and articles from academic books and publications.

Cloud Computing-1

Q1   Define and discuss the uses of IDaaS in at least two paragraphs.  Also, find three IDaaS providers and compare and contrast their  services.

You must include at least one scholarly peer-reviewed article as an APA cited reference.

Q2   Discuss the use of cloud collaboration tools in today’s  geographically diverse environment in at least two paragraphs.  Cite at  least one scholarly peer reviewed article.

Also, compare and contrast two popular video collaboration tools.

qualitative v quantitative risk assessment.

 

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Security Data

Describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? 

Discussion Question

Data governance involves the supervision, monitoring, and control of an organization’s data assets. Its main concerns are data quality, appropriateness, and cost effectiveness of the controls. It is difficult because organizations typically have a lot of old data, which is of unknown quality.

  • Imagine that you must collect and assess the quality and appropriateness of data held by a large, multinational organization. What steps you would take? Include how you would address network, security, and ethical considerations when deciding what data to collect from the company.
  • Explain the kinds of support you’ll need and how you will obtain resources and cooperation. This is not a job you can do on your own!

paper 08/07

IT governance and security culture
                                               

APA format is required – USE THE APA TEMPLATE.

Building on your case project, for week 6 you will research best practices in IT governance and methods for building an IT security culture within the organization. Follow the video links provided and research ITIL and COBIT systems, and determine which may best work for your organization. If your organization already utilizes one of these systems, describe how it has been deployed and what the impacts have been on the organization overall. In addition, following the required reading for this week, evaluate the importance of establishing an IT security culture within your organization and describe your basic plan for getting started. If your organization already employs best practices in security culture, describe what they do and how it works.

Your paper should be 2-3 pages (not including the cover page or final references page), including in-text headings for the topics addressed, and in-text citations matching the references given at the end of the paper.