Prof Writing & Proposal Devel

 

Do a little bit of research on grant writing versus academic (scholarly) writing. 

Then…

1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.

2) Research a need in your community and write a 100-300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum. 

3) Write a quick one paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit. 

 

  • Students must choose from the listed topics of their school/program:

 IT Students:

  • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
  • Using Data Science Techniques To Enhance Data Security

SEC 575

1. The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

2. Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business, seeking to sell to customers located in other states, what are some things you could do to avoid having states where these customers live require you to collect sales tax?

3. The EU has recently changed its trade laws and now refuses, among member nations, to enforce choice of forum clauses when a consumer is a purchaser. How might this refusal to enforce choice of forum clauses impact websites within the EU?

incident response in the cloud

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

week 6 group

  

This assignment should be in APA format and have to include at least two references.

1. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? 

ET WK10 Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • 4 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles (PEER REVIEWED) to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Quantitative Research Design Prompts

Description

This assignment is intended to deepen your understanding of the dissertation process while also developing your scholarly level writing skills. Although the prompts may be of a quantitative nature, each takes into perspective the entire doctoral research viewpoint.

Instructions

After completing the required research and reading for your chosen prompt, post your original response. The responses must be a minimum length of one paragraph and incorporate at least one scholarly level source. Write your response in APA format (7th Ed.). Please review the rubric for further details on grading.

The selected question to write

3B: Threats to Validity

In research, the threat of internal and external validity is commonly discussed. However, some researchers view one more important than the other. In your writing, compare and contrast internal and external validity, and make a determination based on your research/reading for which of the two validity factors is most critical and why, using citations and references to validate your argument.