Ethics – Discussion Post Due 10/18/20 by 5PM Eastern Time

Please answer the below and submit in a word document. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Length should be 130 to 160 words and double-spaced. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words.

1)  Stepping back a little, International Labor and Employment Issues can be a very sticky area.  The question will arise EVERY time.  “Human Treatment vs. Better Profits.”  I am looking forward to seeing how this group will approach this very sensitive necessarily important issue.  When the topic of International Business is raised the issue of employment treatment and over all labor issues must be addressed.  It can be done openly and with an intent of good will or it can be addressed as it has many times in the past as a “letter-of-the-law” issue managed by the “locals” with graft and disdain as the guiding parameters.

2) Some authors have stated that “…compliance with the law is a fundamental component of responsible management” (Baron).  International Businesses must act responsibly in all respects as they do have social and moral responsibilities.  Business management must not only have the appearance of legal compliance, but must actually be in compliance with all laws.  This not only includes the obvious criminal but also a full host of international consequences caused to territorial, environmental, antitrust, securities and other applicable international legal issues. What’s your thought on this?

Baron, D.P. (2013) Business and Its Environment, Seventh Edition. Upper Saddle River, NJ; Prentice Hall.

3) Looking at how companies domestic or multinational (MNC’s) handle the benefits and disadvantages of using employees, independent contractors, foreign sales representatives, and distributors.  Do you think these findings can be considered a model for how  companies should handle these types of issue or is there room for improvement in some areas?

discussion-5

  The differences between and advantages of MAC, DAC, and RBAC. 

  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

security and data loss prevention

  1. Discuss the challenges of private security in terms of licensing, regulating, hiring, and training. 
  2. Identify and discuss the four basic steps in a risk management program.  What is risk analysis or risk assessment? Provide examples in your discussion. 
  3. Name and explain three issues that corporations may be held civilly liable for regarding security matters. 
  4. Identify and discuss some of the changes in security brought about as a result of the 9/11 terrorist attacks against the United States. 
  5. Describe how cruise ships have responded to security-related issues since 9/11. 
  • Turn in the Paper to SMARTHINKING.com before submitting your final paper.
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.
  • Complete the project in APA format
  • Paper should include at least 3 references
  • Paper should be a minimum of 4 pages in length

paper2

 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Cloud Discussion 15

 Review in 500 words or more the video above called Cloud Security Myths. 

 Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes. 

rp

This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately five pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

5s week 7 assignment PL

In 400 words

Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan.  Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include references, Do not copy paste.

counter-reasearch

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.