Posts

[Solved] Homework Edition ” Current

[Solved] Homework Edition ” Current

MLA Style 

Introduction:

Hook-Degrees of success here depend on getting the attention of the reader in 1-2 sentence using either a news event, personal anecdote, popular film / TV example, or an outside quotation NOT taken from a research article.

Bridge-Degrees of success here depend on including an effective transitional sentence which indicates the relationship between the “hook” and the general topic.

Motive-Degrees of success here depend on effectively establishing the importance of the topic itself either through a larger theme, directly posed question, or the neglected /popular trend surrounding the topic itself.

Research Scope Statement-Degrees of success here depend on including an effective description of ALL the research sources as people and active agents of investigation (critics, authors, researches, etc…). Scope may also describe general agreement / disagreement / or both amongst the sources.

Position Evaluation of Research-Degrees of success here depend on effectively stating your opinion on the QUALITY of research through readability / accessibility or productiveness.

Body:

5 paragraphs using all the articles listed below as well as 3 quotes from each one.

Work Cited:

Buia, Carole. “Now, Stop Procrastinating.” TIME Magazine, vol. 160, no. 13, Sept. 2002, p. 83. Academic Search Complete

Jarmon, Amy L. “Don’t Wait to Begin Curbing Procrastination.” Student Lawyer, vol. 36, no. 7, Mar. 2008, pp. 16–17. Academic Search Complete.  

Kasland, Karen. “Procrastination Makeover: Homework Edition.” Current Health Teens, vol. 38, no. 1, Sept. 2011, pp. 16–19. Academic Search Complete

Lewis, Kristin. “You Phone Could Ruin Your Life.” Scholastic Scope, vol. 63, no. 7, Mar. 2015, pp. 4–9. Academic Search Complete

Watson, Thomas. “The Procrastinator.” Canadian Business, vol. 80, no. 18, Sept. 2007, p. 82. Academic Search Complete

[Solved] Critical Analysis Essayys Content

[Solved] Critical Analysis Essayys Content

  College Writing and Critical Analysis 
 

Essayys Content

  1. Click on the link below to read a narrative essayy written by a student.   Based on this essayy AND the lecture notes, answer the following 4 questions:  
  2.  1. Identify the thesis statement of the essayyy Write it out, word for word, exactly as it is in the essayy.    2. (a) Identify the topic sentence for each paragraph – (b) do all the subsequent sentences support the topic sentence?   3. Identify five transition words or phrases that move the essayyy along.   4. What are three of the most effective details of the narrative?

Text book: Writing for Success

Copyright Year: 2015ISBN 13: 9781946135285 

[Solved] Due Date Sunday April

[Solved] Due Date Sunday April

HOMEWORK – WRITE AN ANNOTATED BIBLOGRAPHY YOUR TOPIC MUST BE TIED WITH CULTURAL IDENTITY OR RACIAL PROFILING.( HOW IT SHAPES OR AFFECTS YOUR IDENTITY).

 YOU MUST HAVE 3 CLAIMS AND 3 COUNTER-CLAIMS ( THEY MUST MATCH EACH OTHER IN ORDER). EXAMPLE SHEET WILL BE PROVIDED. 

FORMAT – MLA ( 4-5 PAGES) 

DUE DATE SUNDAY APRIL 30TH AT 10AM. 

 

[Solved] Key Results • Calculations

[Solved] Key Results • Calculations

 

CREATING A SPREADSHEET FOR DECISION SUPPORT

In this assignment, you produce a spreadsheet that models the problem. Then, in Assignment 2, you will use the spreadsheet to gather data and write a memorandum that explains your findings. In Assignment 3, you may be asked to prepare an oral presentation of your analysis.

A spreadsheet has been started and is available for you to use; it will save you time. If you want to use the spreadsheet skeleton, locate Case 10 in your data files and then select TeachersPensionFund.xlsx. Your worksheet should contain the following sections:

• Constants
• Inputs
• Summary of Key Results
• Calculations
• Fund Balance Statement
• Fund Liability

A discussion of each section follows.

Constants Section

Your spreadsheet should include the constants shown in Figure 10-1. An explanation of the line items follows the figure.

• Retiree Years of Service—On average, teachers work for 25 years before retiring.
• Average Increase in Teacher Salary—Teacher salaries are expected to increase by an average of 1 percent each year for the next 30 years.
• Retiree Rate—On average, 4 percent of teachers are expected to retire each year in the next 30 years.
• Mortality Rate—On average, a pensioner receives payouts for 20 years. On average, 5 percent of pensioners are expected to die each year.
• Expected Average Final Salary—The average final salary for teachers retiring in 2016 was $82,000. The average final salary is expected to increase somewhat each year, as shown.
• Expected Administrative Expense—The pension fund has employees, rents office space, consults with experts in securities markets about investments, and has other expenses. The plan’s administrative cost is expected to be $25 million in 2017 and to increase each year, as shown.

Inputs Section

Your spreadsheet should include the inputs shown in Figure 10-2. Possible values are shown in the figure.

Each of the inputs applies to each of the 30 years modeled. An explanation of the line items follows the figure.

• Cost of Living Adjustment—By union contract, this adjustment is 3 percent. Ideally, plan administrators would like to negotiate this percentage lower.
• Long Term Rate of Return—A 7.5 percent return on investments is assumed. Plan administrators want to see the effects of changing this variable.
• Productivity Factor—The total number of teachers has been declining by 0.5 percent each year in recent years. State officials hope for greater productivity in the future.
• Employee Contribution Rate—Working teachers contribute 9.5 percent of their salary to the pension fund. Some state officials think this rate must increase in the future.
• Final Salary Give Back—State officials want a reduction in the final salary for pension purposes. The reduction would be called the “give-back.”
• State Contribution Factor—By contract, the state contributes 2.5 times what the teachers contribute. This factor may need to be increased to ensure there is enough money to pay pensions.

Summary of Key Results Section

Your worksheet should include the key results shown in Figure 10-3. An explanation of the line items follows the figure.

• NPV of Unfunded Liability—The NPV of the pension fund’s unfunded obligation is computed elsewhere in the spreadsheet and can be echoed here.
• Ratio of Assets to Liability NPV—The ratio of the value of fund assets to fund liabilities is computed elsewhere in the spreadsheet and can be echoed here.

Calculations Section

The Calculations section is shown in Figure 10-4. Some 2016 values are provided. Values for 2017 through 2046 are calculated by formula. Use cell addresses when referring to constants in formulas unless otherwise directed. Use absolute addressing properly. An explanation of the line items follows the figure.

• Average Teacher Salary—The average in a year is a function of the prior year’s value and the expected rate of increase in the year. The latter value is from the Constants section.
• Number of Active Teachers—This amount is a function of the prior year’s value and the expected “productivity factor.” The latter value is from the Inputs section.
• Number of New Retirees—This amount is a function of the number of active teachers in the prior year (from the previous row) and the retiree rate for the year (from the Constants section).
• Number of Retirees—The number of retirees in a year is the number of retirees in the prior year plus the number of new retirees in the year, minus the number of retirees who die in the year. The number of retirees who die is a function of the number of retirees in the prior year and the year’s mortality rate. The latter value is from the Constants section.
• Total Teacher Compensation—This amount is a function of the average teacher salary in the year and the number of active teachers. Both values are from the Calculations section.
• Employee Contribution to Fund—This value is a function of total teacher compensation (from the previous row) and the contribution rate (from the Inputs section).
• State Contribution to Fund—This value is a function of the employee contribution (from the previous row) and the state contribution factor (from the Inputs section).
• Average Retiree Benefit—The average retiree payout in a year is a function of the expected final salary in the year (from the Constants section), the .022 payout rate (a factor you can hardcode), and the expected years of service (from the Constants section). This amount should be increased by the expected cost of living factor and then reduced by any give-back amount; both values are from the Inputs section.
• Expected Benefits Payout—The total benefits to be paid in a year is a function of the average retiree benefit and the number of retirees in a year. Both values are from the Calculations section.

Fund Balance Statement Section

This section shows a calculation of the pension fund balance at the end of each year, as illustrated in Figure 10-5. The pension fund’s balance is increased by employee contributions, state contributions, and earnings on fund assets. The pension fund’s balance is decreased by benefits paid and administrative expenses. An explanation of the line items follows the figure.

• Beginning Balance—The balance at the beginning of a year equals the balance at the end of the prior year.
• Add: Employee Contribution—This amount has been calculated elsewhere in the spreadsheet and can be echoed here.
• Add: State Contribution—This amount has been calculated elsewhere and can be echoed here.
• Add: Income on Investments—This amount equals the fund balance at the beginning of the year multiplied by the expected earnings rate. The latter value is from the Inputs section.
• Less: Benefits Payout—This amount has been calculated elsewhere and can be echoed here.
• Less: Administrative Expenses—This amount is taken from the Constants section and can be echoed here.
• Ending Balance—This amount equals the beginning balance plus the employee contribution, the state contribution, and income on investments, minus the benefits paid and administrative expenses.

Fund Liability Section

This section shows a calculation of the NPV of the pension fund’s unfunded liability and the ratio of fund assets to this NPV, as illustrated in Figure 10-6. An explanation of the line items follows the figure.

• Expected Benefits Payout—The fund’s payout in each year has been calculated elsewhere in the spreadsheet and can be echoed here. The series of values will be used in the NPV calculation.
• Net Present Value of Payouts—The NPV of a series of values is calculated using a discount rate applied to those values. Apply the NPV function to the series of expected benefit payouts using .075 as the discount rate. You can hard-code the discount rate.
• NPV of Unfunded Liability—This value is the NPV of payouts minus the fund balance at the end of 2017.
• Ratio of Assets to Liability NPV—This value is the ratio of the fund balance at the end of 2017 to the NPV of payouts.

 

Using the Spreadsheet to Gather Data

You have built the spreadsheet to create “what-if” scenarios for the model’s input values. The inputs represent the logic of a question and the outputs provide information needed to answer the question. The budget director’s questions are discussed next.

Question 1 (Base Case)

The budget director asks, “What are the net present value of the unfunded liability and the ratio of assets to the net present value of the unfunded liability, given the current situation? This is the ‘base case.’ How bad are things right now?” The inputs for the base case are shown in Figure 10-7.

Enter the inputs and then observe the outputs in the Summary of Key Results section. Next, manually record the results in a summary area. You could use a second worksheet for this purpose, as shown in Figure 10-8 (values shown are for illustration only).

Question 2 (Worst Case)

The budget director says, “In the worst case, we cannot do anything about the cost of living adjustment, the stock market tanks, and we earn very little—say 3 percent. Productivity goes to zero and other factors remain the same. That is the ‘worst case.’ How bad would that be?” The inputs for the worst case are shown in Figure 10-9.

Enter the inputs and then observe the outputs in the Summary of Key Results section. Next, manually record the results in the summary area.

Question 3 (Aggressive Case)

The budget director says, “In my dreams, I take an aggressive line with the union and I win the battles. The cost of living adjustment is reduced to 1 percent. The productivity factor doubles to 1 percent. The employee contribution rate is increased to 10 percent. The salary give-back is $4,000, and the stock market comes back, so we earn 10 percent on our money. That is the ‘aggressive case.’ How good would things be? Surely the ratio gets to 80 percent then!” The inputs for the aggressive case are shown in Figure 10-10.

Enter the inputs and then observe the outputs in the Summary of Key Results section. Next, manually record the results in the summary area.

Question 4 (Rescue Case)

The budget director says, “I know the governor is going to ask what the state would have to do to bail out the current system. So, assume the conditions of the base case, except for the state contribution factor.” Run a “what-if” scenario with that factor until you reach a ratio of 80 percent. How big a factor is needed? Call this question the “rescue case.” How much extra money would the state have to contribute versus the base case contribution by the state? The inputs for the rescue case are shown in Figure 10-11.

Enter the inputs and then observe the outputs in the Summary of Key Results section. The extra dollar amount that the state would contribute can be calculated by comparing state contribution amounts in the Calculations section in the two scenarios. Next, manually record the results in the summary area.

When you finish gathering data for the four questions, print the model’s worksheet with any set of inputs. Print the summary sheet data as well, and then save the spreadsheet for the final time.

 

Documenting your Findings and Recommendation in a Memo

Document your findings in a memo that answers the budget director’s four questions. The memo should also state your more general assessment of the fund’s financial position: How bad or good is the situation? Use the following guidelines to prepare your memo in Microsoft Word:

• Your memo should have proper and standard headings, such as Date, To, From, and Subject. You can address the memo to the administrators of the state pension fund. Set up your memo as described in Tutorial E.
• Briefly outline the situation. However, you need not provide much background—you can assume that readers are familiar with the situation.
• Answer the four questions in the body of the memo.
• Include tables and charts to support your claims, as your instructor specifies. Tutorial E explains how to create a table in Microsoft Word. Tutorial F explains how to create charts in Excel.

 

GIVING AN ORAL PRESENTATION

Assume that the budget director asks you to be ready to present your analysis and results in an oral presentation to some key legislators. “These guys are always looking for the silver bullet—you know, trying to fix the problem by changing only one thing. So, they want to see sensitivity data and they want it in chart format,” she tells you. “For example, someone will want to know how much the asset-to-liability ratio would change if there was a change in the market rate of return. So get those kinds of charts ready.”

Prepare to talk to the group for 10 minutes or less. Tutorial F explains how to prepare and give an oral presentation.

Your instructor will tell you what sensitivity analyses to prepare or may tell you to choose these analyses yourself. The example chart to which the budget director referred should look like the one shown in Figure 10-12.

[Solved] Operation Stop Hack Operation

[Solved] Operation Stop Hack Operation

OPERATION STOP HACK

Operation Stop Hack

Introduction

Suppose you have recently responded to your first computer forensic incident. The case in question involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation (FBI) have been investigating for several years. It has since been determined that an IP address confirms that location, and the identity of one of the suspects. Warrants have been issued for search and seizure of all electronic devices found on the premises.View the setup found in the suspect’s home. Then document your findings and secure all relevant evidence.

Instructions

Write a 2–3 page paper in which you:

  1. Investigate the legal statutes involved in this type of case and outline specific legal consideration to take when collecting evidence.
  2. Pre-plan how to approach the crime scene, documenting the steps and procedures to process the digital evidence.
  3. Analyze the crime scene diagram and document and tag each device that will be collected for evidence, specifying the importance of each device.
  4. Use the St.Library to conduct your research. Use no less than three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed and double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

Learning Outcomes

The specific course learning outcome associated with this assignment is:

  • Outline the legal steps and procedures to process and collect digital evidence.

[Solved] 3 37 –

[Solved] 3 37 –

Part 1: Research Acceptable Use Policies (0/1 completed)

Note: In this part of the lab, you will review scholarly research on AUPs in order to form a basis for their purpose and usage. Understanding the reason for developing an AUP is key to understanding its component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.

1. Using your favorite search engine, locate and read the following scholarly, peer-reviewed research article referencing AUPs:

Cramer, M., & Hayes, G. R. (2010). Acceptable use of technology in schools: Risks, policies, and promises. IEEE Pervasive Computing, 9(3), 37–44. https://doi.org/10.1109/MPRV.2010.42

Note: If you are unable to locate or access this research, find a similar scholarly, peer-reviewed article and provide a citation in your response.

2. Write a brief summary of the article. In your summary, focus on the need for an AUP and its key elements.

Part 2: Design an Acceptable Use Policy (0/1 completed)

Note: In this part of the lab, you will use what you learned from your research to design your own acceptable use policy.

  1. Review the example of an AUP on the SANS site: https://www.sans.org/reading-room/whitepapers/policyissues/acceptable-policy-document-369.

Note: While you evaluate the document, notice the following items:

  • The policy mentions positions rather than specific names.
  • The policy provides an overview of the topic but does not provide specifics on how a task will be completed. This point is the difference between a policy and a procedure.
  • The policy provides references to other policies or resources that were used to create it.

Keep this example in mind as you prepare for the next steps.

2. Consider the following fictional organization, which needs an acceptable use policy (AUP):

 

  • The organization is a local credit union with several branches and locations throughout the region.
  • A major focus for the organization is online banking.
  • The organization’s most critical business function is its customer service department.
  • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.

Note: The best style for writing IT policy is straightforward and easy to understand. Avoid unnecessary wording and phrasing that could be understood more than one way. Write in concise, direct language.

3. Design an AUP for this fictional credit union, using the online example of the AUP as a template. Your policy does not need to be exhaustive, but it should outline the key components of an AUP and provide policy statements that address the above requirements. You may want to create your policy using word processing software on your local computer and then copy and paste the text into the deliverable field.

Challenge Exercise (0/3 completed)Note: The following exercise is provided to allow independent, unguided work using the skills you learned earlier in this lab – similar to what you would encounter in a real-world situation.

For this portion of the lab, you will utilize the AUP that you designed in Part 2. This exercise is designed to challenge your creativity by not providing industry guidelines or clues as provided in Part 2.

Select an industry other than banking. For example, you could choose manufacturing, higher education, or utilities.

Create a list of unique attributes of the business in your chosen industry.

Instead of creating an AUP, write a formal letter to the company’s CEO and board to explain the need for an AUP and your suggestions on the content of that policy.

[Solved] Egress Traffic Policy Mandated

[Solved] Egress Traffic Policy Mandated

Part 1: Research Security Policy Frameworks (0/2 completed)

Note: In this part of the lab, you will review internet resources on security policy frameworks in order to form a basis for their purpose and usage. Understanding the reason behind a security policy framework is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts behind the framework itself.

1. In your browser, navigate to https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies-1331.

2. Read Sections 1-5 of the SANS Policy Development Guide.

3. Summarize the Policy Development Guide’s recommendations for organizing a policy hierarchy and selecting policy topics.

Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often.

Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high level, but they answer the “what” questions. Finally, the procedures and guidelines provide the “how.”

Examples of security policy and guideline templates are available from the SANS Institute at https://www.sans.org/information-security-policy/.

In the next steps, you will learn about COBIT 2019, a popular industry-standard policy framework.

4.  In your browser, navigate to https://www.cio.com/article/3243684/what-is-cobit-a-framework-for-alignment-and-governance.html.

5. Describe the core principles and objectives of COBIT 2019.

Part 2: Define a Security Policy Framework (0/2 completed)

Note: Understanding both unique and universal risks to your organization’s IT infrastructure is essential to developing an appropriate IT security policy framework for your organization. In this part of the lab, you will review a list of risk, threats, and vulnerabilities and define appropriate policies to mitigate them. Next, you will organize your policies into a policy framework.

1. Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company.

  • Unauthorized access from public Internet
  • Hacker penetrates IT infrastructure
  • Communication circuit outages
  • Workstation operating system (OS) has a known software vulnerability
  • Unauthorized access to organization-owned data
  • Denial of service attack on organization’s e-mail
  • Remote communications from home office
  • Workstation browser has software vulnerability
  • Weak ingress/egress traffic-filtering degrades performance
  • Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse
  • User destroys data in application, deletes all files, and gains access to internal network
  • Fire destroys primary data center
  • Intraoffice employee romance gone bad
  • Loss of production data
  • Need to prevent rogue users from unauthorized WLAN access
  • LAN server OS has a known software vulnerability
  • User downloads an unknown e-mail attachment
  • Service provider has a major network outage
  • User inserts a USB hard drive with personal photos, music, and videos on organization-owned computers
  • Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router

2. For each risk, threat, or vulnerability in the list above, select an appropriate security policy that might help mitigate it. You can select one of the SANS policies or choose one from the following list.

Security Policies

  • Acceptable Use Policy
  • Access Control Policy
  • Business Continuity—Business Impact Analysis (BIA) Policy
  • Business Continuity and Disaster Recovery Policy
  • Data Classification Standard and Encryption Policy
  • Internet Ingress/Egress Traffic Policy
  • Mandated Security Awareness Training Policy
  • Production Data Backup Policy
  • Remote Access Policy
  • Vulnerability Management and Vulnerability Window Policy
  • Wide Area Network (WAN) Service Availability Policy

3. Organize the security policies you selected so that they can be used as part of an overall framework for a layered security strategy.

Challenge Exercise (0/2 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

A user at Digital Innovation Products has been using company network resources to download torrent files onto a USB drive and transfer those files to their home computer. IT tracked down the torrent traffic during a recent network audit. Unfortunately, the company does not have a current policy that restricts this type of activity.

Identify at least two appropriate policies that should be in place to define this type of behavior and the consequences thereof.

Write a brief overview for C-level executives explaining which policies should be added to the company’s overall security policy framework, why they should be added, and how those policies could protect the company.

[Solved] Truly Separated Duties Often

[Solved] Truly Separated Duties Often

Part 1: Research Separation of Duties Policies (0/1 completed)

Note: In this part of the lab, you will review scholarly research on separation of duties policies in order to form a basis for their purpose and usage. Understanding the reason behind a SoD policy is key to understanding the component policies and procedures. Please take time to review the research thoroughly and think through the concepts of the policy itself.

1. Using your favorite search engine, locate and read the following scholarly, peer-reviewed research article referencing separation of duties policies.

Lu, J., Li, R., Lu, Z., & Jin, Y. (2009, December 31). Dynamic Enforcement of Separation-of-Duty Policies. Paper presented at the International Conference on Multimedia Information Networking and Security. http://dx.doi.org/10.1109/MINES.2009.102

2. Write a brief summary of the article. In your summary, focus on the need for a Separation of Duties policy and its key elements.                                                                                                    

Part 2: Create a Separation of Duties Policy (0/6 completed)Note: In Part 1 of this lab, you learned about the motivating factors that inform a separation of duties policy. In this part of the lab, you will create your own separation of duties policy for a given scenario. As you prepare your policy, remember that no one individual or team should have too much authority or power to perform a function in a business or organization and that understanding where responsibilities begin and end is critical to effective separation of duties. However, just because one individual or team has decidedly too much authority or power does not necessarily mean that management should apply separation of duties to mitigate the risk given that truly separated duties often means additional labor and/or costs. Instead, management might decide to accept the risk or address the risk by other means.

1. Review the following scenario for the fictional Bankwise Credit Union:

  • The organization is a local credit union that has multiple branches and locations throughout the region.
  • Online banking and use of the internet are the bank’s strengths, given its limited human resources.
  • The customer service department is the organization’s most critical business function.
  • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the Internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.
  • The organization wants to define a policy framework, including a security management policy defining the separation of duties for information systems security.

2. Create a security management policy with defined separation of duties for the Bankwise Credit Union.

Bankwise Credit Union

Separation of Duties Policy

Policy Statement
(Define your policy verbiage.)

Purpose/Objectives
(Define the policy’s purpose as well as its objectives.)

Scope
(Define whom this policy covers and its scope. What elements, IT assets, or organization-owned assets are within this policy’s scope?)

Standards
(Does the policy statement point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards.)

 Procedures
(Explain how you intend to implement this policy for the entire organization.)

Guidelines
(Explain any roadblocks or implementation issues that you must overcome in this section and how you will surmount them per defined guidelines. Any disputes or gaps in the definition and separation of duties responsibility may need to be addressed in this section.)

Challenge Exercise (0/1 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

For this portion of the lab, you will complete additional research of a case study in separation of duties and provide your own overview of the problem and solution. 

Locate and read the following research article:

Ballesteros, S., Pan, L., Batten, L., & Li, G. (2015). Segregation-of-Duties Conflicts in the Insider Threat Landscape: An Overview and Case Study. Paper presented at the Second International Conference on Education Reform and Modern Management. https://doi.org/10.2991/ermm-15.2015.96

Discuss how a separation of duties policy would help to resolve the issues at Bankwise Credit Union, as discussed in this case study. Assume your audience is the CEO and Board of Bankwise Credit Union.

[Solved] Think Performance Appraisals Still

[Solved] Think Performance Appraisals Still

1.  The method of training used can affect the behavior and cognitive learning of the audience; therefore, in meeting the needs of the audience, you must consider the various methods of how training is delivered (i.e., traditional vs. web-based). Of the traditional types of methods, which would you select for your organization? Why

2. Do you think performance appraisals still serve  a purpose in management efforts? How often does your organization conduct performance appraisals? Do you think your organization’s appraisals are beneficial to you and the company? How can they be improved?

3. Performance appraisals are used to identify deficiencies in employees’ on-the-job performance, which leads to recommended training and development; however, there are some legal issues or concerns that can develop if proper training is not provided. How does your organization document that employees have been provided proper training, have successfully completed the training, and are actively applying the learned material within their day-to-day duties and responsibilities?

Please keep them number.  100 words count

[Solved] Meet Word Count

[Solved] Meet Word Count

1.  Briefly discuss the difference between training and development and how they can affect a performance appraisal.

Your response must be at least 200 words in length.

2.  What is the process for developing a succession plan? Also, explain the importance of a succession plan.

Your response must be at least 200 words in length.

Please keep them number, and please own words, and meet word count. 200 word count