Ethics, Law and Cybersecurity

 

  1. You have just been appointed to the board of directors of TAMU.com, however, the dot.com company has been experiencing some difficult financial times that have resulted in revenue losses in three of the last four quarters.  As you take your new position, you discover that two proposals are on the table.  Each proposal has been put forth as a means for dealing with TAMU’s immediate financial problems.  Proposal #1 recommends all employees be retained, but that an immediate wage freeze for all employees be imposed for the next six months.  (Employees may even be asked to take a 5 percent cut in pay if things do not improve by the end of that period.)  Proposal #2 recommends that wages not be frozen, but that 5 percent of the company’s workforce be laid off.  (One piece of reasoning behind this proposal is that taking more drastic measures will “protect” 95 percent of TAMU’s workers and will send a message to Wall Street and local investors that TAMU is serious about improving its financial position and that it will soon be a stable company once again.) The board is evenly split, seven members for proposal #1 and seven for proposal #2.  Yours will be the tie-breaking vote.  In your deliberation, describe how an act utilitarian, a rule utilitarian, a rule deontologist, and act deontologist would reach each solution to this dilemma and on what basisWhich solution seems most plausible? Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)
  2.  Do you feel that any of the four traditional ethical theories examined in chapter two are adequate to handle moral issues that arise as a result of cybertechnology?  Is a brand new ethical theory needed, as some have argued, for the Internet age; or can a comprehensive, integrated theory, such as the one proposed by James Moor (i.e., his theory of “just consequentialism”) be used successfully to resolve moral issues involving cybertechnology?  Explain your answer. Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)
  3. Consider a case in which the United States government, with the approval of the majority of Americans, decides to round up all Arab-Americans and relocate them into internment camps.  Imagine that you have a friend who is an American citizen of Arab descent.  She asks you to protect her from the authorities.  You have known this person all of your life, and you are convinced that she is a loyal American.  You agree to hide her in the third floor of your house.  A United States federal agent knocks on your door and asks if you know the whereabouts of the person you are hiding.  How would you respond to that agent?  You now face a genuine moral dilemma because you cannot both keep your promise to your friend and tell the truth to the federal agent.  Initially, your gut reaction might suggest that the solution to your dilemma is really quite simple.  For example, you might believe that a far greater good will be served by lying to the federal agent than by breaking your promise to your friend.  However, to embrace the moral principle inherent in that line of reasoning is to fall back into utilitarianism.  We have already seen some of the difficulties that can result from trying to be a consistent and thoroughgoing utilitarian.  Could you consistently universalize a moral principle that states:  “Whenever you must choose between telling the truth to authorities and breaking a promise to a friend, always honor your promise”?  Will that principle work in every case?  Will Ross’s theory help in this situation?  Explain your answer. Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)

I need help on 2 questions but No1 is mandatory and you can choose another from 2 and 3

 For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cryptography Assignemnt

 

For this assignment, you will solve the problem presented using Figure 7.17 located in our text and write a 2-3 page report that includes the following:

  • 2-3 pages of content minimum (does not include cover, abstract or references pages)
  • The paper must conform to full APA guidelines to include a cover page, abstract, headers, introduction, body paragraphs with appropriate headings/subheadings, conclusion, and a reference page.
  • All sources must be cited and referenced. Remember, unless the statement is common knowledge, you must cite and reference your sources.
  • You must use at least one peer-reviewed source

Problem:  You want to build a hardware device to do block encryption in the cipher block chaining (CBC) mode using an algorithm stronger than DES. 3DES is a good candidate. Figure 7.17 shows two possibilities, both of which follow from the definition of CBC. Which of the two would you choose and why:

  1. For security?
  2. For performance?

You must fully explain and support your justification and reasoning.

FULL APA FORMATTING IS REQUIRED! 

Follow all academic integrity policies.  Please read them again if you are unfamiliar.  I will be using SafeAssign.  You may also submit your work to SafeAssign up to 3 times to check your own work for similarity. I will grade the last submission.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

For Kim Woods * CMGT 555 Week 2 WeLoveVideo Waterfall & Agile Project Flow

After consideration of your proposal from Week 1, the WeLoveVideo, Inc. CIO is having a hard time envisioning how the project would be executed based on your recommendations. She has asked your company to develop a project plan in both waterfall and Agile so she can better understand the implications to her team.

Using Microsoft® Excel®, develop two milestone-level project plans: one using the waterfall and one using Agile SDLC. The milestones should demonstrate a clear understanding of the inputs and outputs for each phase of a project, based upon the SDLC applied. At minimum, there should be a clear milestone at the end of each project phase, and potentially milestones within phases where applicable. Ensure that each project plan incorporates comprehensive SDLC phases based on each SDLC type.

Attached are the backstory for WeLoveVideo Inc., and my Week 1 assignment. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Enterprise Risk management

Please review : Constructive Dialogue and ERM: Lessons from the Financial Crisis Case and provide response for following questions.

1. What are the preconditions for conducting constructive dialogue in an organization?

2. Is effective risk management possible without constructive dialogue?

3. What are the forces that tend to undermine effective risk management in an organization?

4. Given its obvious value in helping an organization to understand the major risks that could prevent it from accomplishing its mission and objectives, why was the financial sector, including a risk-sensitive organization such as Goldman Sachs, so slow in adopting ERM?

You are required to respond to the questions thoroughly, in 250 -to-300 words for each question. Be sure to include at least three reference sources. APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2 – Task1 – DRP and CIRT

 Read the Boiler Plates provided for the Disaster Recovery Plan and Computer Incident Response.  (PFA)

Review the CarVend Sales scenario.  What would you create as the DRP and CIRT for this scenario?

 Write a 3-page paper using APA format 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

java global rain

 

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Implement appropriate language constructs for an object-oriented programming language

Scenario

Global Rain logo

You work for Global Rain, a software engineering company that specializes in custom software design and development. As a junior software developer, you are part of a software development team at Global Rain that collaborates to create software solutions for entrepreneurs, businesses, and government agencies around the world.

You have been newly assigned to a development team at Global Rain that is currently working on a project for an innovative international rescue animal training company, Grazioso Salvare. Grazioso Salvare is seeking a software application that will help track rescue animals, sometimes referred to as search and rescue animals, which are obtained and trained by the company to rescue humans or other animals from difficult (or even life-threatening) situations.

A portion of this work has already taken place on this project. Your team lead has assigned you to create one new class and modify the existing classes in the software application. You will deliver these class files to the team lead, who will consolidate them with the work from other team members and present the application to your client.

Directions

Grazioso Salvare has provided you with a specification document detailing its software needs. Other members of the Global Rain development team have started creating the RescueAnimal.java, Dog.java, and Driver.java class files. Your team lead has asked you to modify the existing classes and create a Monkey.java class as your contribution to the team.

Three individuals gathered around a computer

  1. To gain a clear understanding of the client’s software requirements, review the Grazioso Salvare specification document in the Supporting Materials section. As you read, pay close attention to the attributes and methods that you will need to implement into the program.
  2. Open the Virtual Lab by clicking on the link in the Virtual Lab Access module. Then open your IDE. Follow the IDE tutorial in the Supporting Materials section to upload Grazioso.zip into your IDE. This zipped folder contains three class files. Once you upload the files, compile the code. Although the program is not complete, it will compile without error.
  3. Read through the code for each class. This will help you understand what code has been created and what code must be modified or created to meet the software requirements.
  4. Before you begin modifying and creating classes, your team lead reminds you to demonstrate industry standard best practices in all your code to ensure clarity, consistency, and efficiency among all software developers working on the program. This includes ensuring the following:
    • In-line comments denote your changes and briefly describe the functionality of each method or element of the class
    • Appropriate variable and method naming conventions are used throughout your code
  5. Once you have completed your pre-work, you are ready to begin your assigned tasks. To start, modify the RescueAnimal.java class file by adding accessor and mutator methods for each class variable.
  6. Create the Monkey class, using the specification document as a guide. The Monkey class must do the following:
    • Inherit from the RescueAnimal class
    • Implement all attributes with appropriate data structures
    • Include accessors and mutators for all implemented attributes
  7. Select a method from the Software Requirements section of Grazioso Salvare’s specification document. Using the selected method, modify the Driver.java class file to do the following:
    • Implement the method you have chosen
    • Add attributes, as needed, to support the required functionality

What to Submit

To complete this project, you must submit the following:

RescueAnimal.java Class File
Modify the RescueAnimal.java class file in accordance with the requirements of the specification document. Be sure to include in-line comments that explicitly identify the changes you made as well as describe the functionality of the code.

Monkey.java Class File
Create a Monkey.java class file that meets the requirements laid out in the specification document. Be sure to include in-line comments that explicitly identify the changes you made as well as describe the functionality of the code.

Driver.java Class File
Modify the Driver.java class file in accordance with the requirements of the specification document. Be sure to include in-line comments that explicitly identify the changes you made as well as describe the functionality of the code.

Dog.java Class File
Submit the Dog.java class file, even though you were not required to make changes to it for this project.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Organizational

 

After reading the article “Adding Value in Nike’s Production Line,” research your favorite brand of shoes (Nike, Adidas, New Balance, etc) and answer the following questions: Has the company experienced declining or increased cost attributed to computerization? Was variable cost increased or decreased? Were fixed cost increased or decreased. 

https://digital.hbs.edu/platform-rctom/submission/adding-value-in-nikes-production-line/ 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ethics and cyber security

 

  1.  Using argument components discussed in Chapter 3, assess arguments for and against the use of biometric technologies for security, especially in airports and large stadiums. (a) Should biometric technologies such as face-recognition programs and iris scanners be used in public places to catch criminals? Since 9/11 there is much more support for these technologies than there was when biometrics were used at Super Bowl XXXV in January 2001. (b) Granted that such technologies can help the government to catch criminals and suspected terrorists, what kinds of issues do they raise from a civil liberties perspective? (c) Compare the arguments for and against the use of biometric technologies in tracking down criminals to arguments discussed in Chapter 5. (d) Do you support the use of biometrics in large, public gathering places in the United States? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  2. In looking at the case of Internet entrapment involving a pedophile that was discussed in this chapter (a) which arguments can be made in favor of entrapment or “sting operations” on the internet? (b) From a utilitarian perspective, entrapment might seem like a good thing because it may achieve desirable consequences, but can it be defended on constitutional grounds in the United States? (c) Justify your position by appealing to one or more of the ethical theories described back in Chapter 2. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. (a) Are the distinctions that were drawn between cyberspecific and cyberrelated crimes useful? (b) Why would cyberstalking be classified as a cyberrelated crime, according to this distinction? (c) Among cyberrelated crimes, is it useful to distinguish further between cyberexacerbated and cyberassisted crimes? (d) Why would cyberstalking be categorized as a “cyberexacerbated” rather than a cyberassisted crime? (e) Why not simply call every crime in which cybertechnology is either used or present a cybercrime? (f) Would doing so pose any problems for drafting coherent cybercrime legislation? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  4. (a) What implications does the conviction of the four cofounders of The Pirate Bay Web site (in 2009) have for international attempts to prosecute intellectual property crimes globally? (b) Should the four men also have been required to stand trial in all of the countries in which copyrighted material had been downloaded from their Web site? (c) Will the outcome of The Pirate Bay trail likely deter individuals and organizations, worldwide, from setting up future P2P sites that allow the illicit file sharing of copyrighted material?  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Article on incidents where physical security failed

In this assignment, you will search the Internet and find a minimum of two articles with an incident when physical security failed. You will then provide a brief overview of the event. After that, you will then write at least three (3) paragraphs on each article.

Each paragraph will have at least four (4) complete sentences with a DIFFERENT in-text citation.

In those paragraphs, you will write what protocols you would have put in place if you were in charge of security for the organizations mentioned in the articles. Ensure that you support your arguments with at least one in-text citation in each paragraph.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ass 1-ITC

  

Written Assignment 1: Quality of Simulation

Chapter 3 discusses methods to assess the quality of simulations. You learned about three different views of simulation quality.

Suppose you lead a task force that is developing a simulation to provide strategic planning recommendations for property use zoning for a county of 750,000 residents. The zoning board and county commissioners want a simulation that allows them to assess the impact of various zoning decisions based on a variety of dynamic factors, including age, race, education, and income status. 

Submit a 3-page (double-spaced) paper addressing the following:

1. First, identify which of the three views discussed in the chapter that would provide the best quality assessment for the situation described above, and explain your decision. 

2. Explain how would you ensure the highest level of accuracy with your simulation, and how would you go about determining accuracy?

Ensure that you include at least three (one from course material and two from external sources) APA-compliant references and corresponding in-text citations. 

No plaigarism

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now