Cloud risk management plan | Computer Science homework help


you will be creating a cloud risk management plan.  Please do not submit a paper; please submit a plan.   A plain is defined as  an intention or decision about what one is going to do.  To this point, I want to know, what’s your plan for managing risks related to the cloud.  The plan is how you plan to manage risks related to using a third party cloud vendor.  The plan must address the six steps below and include a risk registry.  Please note, your risk registry should not be empty. The NIST document, this week’s lecture, and template from the textbook on page 448 will help you frame the plan.  You may have to research additional information to put the plan together.  Here’s a hint: risk = vulnerability x threat x the likely hood of an incident occurring.   

Step 1: Categorize Information Systems. …

  • Step 2: Select Security Controls. …
  • Step 3: Implement Security Controls. …
  • Step 4: Assess Security Controls. …
  • Step 5: Authorize Information System. …
  • Step 6: Monitor Security Controls.

Image result for risk management framework nist 

Elevator speech and worksheet | Human Resource Management homework help

Previous and current experience are Receptionist, Payroll Analyst, Operations administrator, Office Administrator/ Accounting. 

Career : Human Resource Management.

Do not use any other template. MUST USE ATTACHED WORKSHEET!!!!

you will be creating an elevator speech that you can use to market yourself to potential employers. A key component to any job search is the ability to develop your brand. 

Part 1) Craft your brand

For this assignment you will need “Crafting your Personal Brand Workbook” and “Crafting your Personal Brand Worksheet” (attached word documents)


I need a word document in which I will record my own speech I need speaker notes. 

The message was no longer than 90 seconds.

Busi 643 literature review | Management homework help


 final part, is writing a Literature Review of at least 8–10 full pages,  minimum, utilizing at least 12 scholarly articles from peer-reviewed  journals, published within the past 5 years. References may not come  from websites, blogs, newspapers, books, dictionaries, conference  proceedings, or magazines.

A reference page is needed for the  final submission (i.e. instead of the Annotated Bibliography). The  Literature Review must consist of at least 12 scholarly articles from  peer-reviewed journals, published within the past 5 years. You must  submit a draft to SafeAssign to check the integrity of your work. This  will ensure that your Literature Review has a score of 25% or less. You  must submit your Literature Review by 10:59 p.m. (CST) on Sunday of  Module/Week 7. 


Literature Review Instructions 


Title Page
Introduction (At least one page, Level 1 heading)
Findings (At least six pages, organized under Level 1 headings)
Conclusions and Recommendations (At least one page, Level 1 heading)
References (Each of the 12 references must be discussed in the narrative, and correctly cited in the narrative. No quotations.)

  • (Each reference must be an article from a peer-reviewed journal with a publication date of 2014 or after.

Literature Review 


Submit this assignment by 11:59 p.m. (ET) on Sunday.

The SafeAssign Similarity Index for Literature Review must be 25% or less. This is a university requirement. No exceptions.

The Literature Review and other written assignments must be submitted as one MS Word attachment 

Professor’s recommendations/reminders:

  1. This  is your major project for the course: 12 scholarly articles from  academic peer-reviewed journals published within the past five years;  8-10 full and complete pages of analysis and discussion.
  2. The  Literature Review should consist of the eight articles from the Week 3  Annotated Bibliography – with the exception of any articles or  references disallowed by the professor – plus four new articles from  peer-reviewed journals.
  3. Prior to beginning this assignment, please explore the “Literature Review Instructions” link above.
  4. Please  review again the “Professor’s Improvement Suggestions” document  available for download in the “Syllabus and Assignment Instructions”  area of the Course Content. Reading and following the “Literature  Review” section of this document will help you achieve full credit.
  5. Review  the Literature Review Grading Rubric (Course Content area) in advance,  to ensure that you understand how the assignment will be scored.
  6. The Literature Review must not be a string of quotations. Keep quotations to an absolute minimum. Zero quotations preferred.
  7. Required elements:
  • Title page
  • Abstract (A concise summary of the key points of your research. Write the abstract last.)
  • Introduction  (About one page – gives a quick idea of the topic of the literature  review, such as the central theme or organizational pattern.)
  • Body (Contains your discussion of sources and is organized thematically.)
  • Conclusions/Recommendations  (Discuss what you have drawn from reviewing literature so far. Where  might the discussion proceed? At least one page.)
  • APA-formatted References list
  1. Remember  to insert in-text citations (using the APA-formatted author-date method  of citation) throughout your narrative, and anytime the information you  provided did not originate with you, or is not common knowledge, and  anytime you use the ideas, facts, statistics or information from the  authors of your references. In-text citations are required.
  2. Please  see Section 3.03 of the APA Manual for the correct use of headings  throughout your paper. For example, Level 1 headings are centered and  boldface with uppercase and lowercase letters. 
  3. As stated previously, articles must be from peer-reviewed, academic journals. No books,  textbooks, websites (,, etc.), newspapers, monthly or  weekly magazines, blogs, or the results of google-type searches.
  4. Reminder:  A scholarly journal is a research-oriented academic, peer-reviewed  publication with an editorial board that screens articles according to  the highest academic standards. There are tutorials available about  academic journals on the LU library’s webpage, for example: . Also, see the Professor’s Improvement Suggestions document for additional information, and a list of prohibited sources. 
    • Remember–
    • If  the magazine containing the article is published monthly or weekly,  then it is not a scholarly journal. Scholarly journals are published  quarterly, or less frequently.
    • If an article does not have a named author, then it is not from a scholarly journal.
    • If  an article does not include a lengthy reference list citing other  scholarly articles, then it is not from a scholarly journal.

Basic types of economies | Economics homework help


For this Discussion Question, complete the following.

1.  Read the short explanation of the 4 basic types of economies. Research two of these types further.  

2. Locate one journal article for each of your two chosen economic types. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.  

3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources.

Please post (in APA format) your article citation. 

Need at least 300 words 

Studies in social psychology (worth 30 points)



The purpose of this discussion is to apply concepts in social psychology to examine the extent to which influential social psychological experiments  and studies from the past remain relevant to human behavior today.

Learning Objectives 3d and 5c

*Please  note:* This discussion forum is “post first.” In other words, you will  not see the posts of your classmates until after you post. When you  post, your classmates’ posts will be revealed so you can read them and  compose your reply.

Step 1:  Select a social psychological experiment or study from the list below,  or search the web and identify one that compels you.  If you decide to search the web and identify one not on the list below, please make sure the experiment or study was conducted by a university, college, or credible entity.

Robbers Cave Experiment (1954)

A Class Divided Experiment (1968)

Asch Conformity Study (1951)

Bobo Doll Experiment (1961 – 1963)

The Marshmallow Test Experiment (1972)

The Stanford Prison Experiment (1971)

The Milgrim Experiment (1961)

The Car Crash Experiment (1974)

The Violinist in the Metro Study (2007)

The BBC Prison Study (2002)

The Case of Kitty Genovese (1964)

The Halo Effect Study (1977)

Step 2:  Conduct web research to explore what happened in the experiment or  study, the findings of the experiment or study, and the flaws and/or  criticisms of the experiment or study.  

Step 3:  Based on your textbook readings and web research, compose a post that responds to the following:

  • Explain  the study or experiment you selected, describing what happened in the  experiment or study.  Also, explain any conclusions drawn based on the  experiment or study.  Next, identify flaws and/or criticism of the  experiment or study. 
  • Based  on this module’s readings, select at least *two* concepts in social  psychology and explain how the dynamics associated with both concepts  influenced the participants in the study or experiment you selected.
  • Explain  the ways in which the findings from the study or experiment you  selected are relevant today or are no longer relevant today.  In your  explanation, try to avoid opinion only; instead, conduct web research to  include relevant statistics or a more recent study that replicated the  findings of the study or experiment you selected. 
  • Include the links from your sources.

Wk14 | Information Systems homework help

Subject: Physical Security

Question 1: 400+ word Essay (minimum 2 latest journal references(use only last 3 years journal article references) & All citations should be in APA format.

Compare and Contrast the five different fire classifications.

You must use at least one peer-reviewed scholarly article properly cited in APA format.

Subject: Negotiation and Conflict Management

Question2: Write a 3-page Journal Article Review of a scholarly peer-reviewed journal article 

Refer the attached document “Negotiation.docx”

****Please strictly follow the directions in the document*****


Question 3: Write a 400+ word essay (APA format & 2 latest scholarly journal article references 2016 on words) 

Explain in your own words what some of the challenges are with the Change Management Process for IT security.


Question 4: Write a 400+ word essay (APA format & 2 latest scholarly journal article references 2016 on words) 

Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process.

Question 5: Write a 500+ word essay (APA format & 2 latest scholarly journal article references 2016 on words) 

Select one network scanning software tool (refer “Network scanning software tools.JPG”) and explain in detail how it works and how it detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.

Subject: Analyzing and Visualizing Data

Question 6: Write a 400+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)

Discuss what is required to really make visualizations work. Berinato (2016) notes that the nature and purpose of your visualizations must be considered in order to start thinking visually. Berinato combines the nature and purpose into a 2×2 matrix that defines the following four types of visual communication: idea illustration, idea generation, visual discovery, and everyday dataviz.  Select and discuss one of the four types of visual communication: idea illustration, idea generation, visual discovery, and everyday dataviz from Berinato’s 2016 article.

For the article refer to the attached “Berinato.pdf”

Subject: Information Governance  

Question 7: Write a 10+ page research paper (APA format & latest scholarly journal article references 2016 on words)

Refer the details in attached document “IG_Final Paper.docx”

using the draft paper from the last week work, finish the final paper. all the previous work attached in the above document.

Subject: Access Control (need 2 copies of answers and make sure to not use common references)

Question 8: Write a 500+ word essay (APA format & 2 latest scholarly journal article references 2016 on words) 

Refer the attached document “Required Practical Connection Assignment.docx”

****Please strictly follow the directions in the document***** 

Subject: Security Architecture & Design (need 2 copies of answers and make sure to not use common references)

Question 9: Write a 400+ word essay (APA format & 2 latest scholarly journal article references 2016 on words) 

If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. 

Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. 

Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.?  

Question 10: (need 2 copies of answers and make sure to not use common references)

Write a 600+ word peer reviwed assignment (APA format & 2 latest scholarly journal article references 2016 on words) 

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? 

If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?

Subject: Emerging Threats and Countermeasures (need 2 copies of answers and make sure to not use common references)

Question 11: Write a 400+ word essay (APA format & 2 latest scholarly journal article references 2016 on words) 

How basic uncomplicated  “situation awareness” can help tremendously with security countermeasures?

Subject: InfoTech in a Global Economy (need 2 copies of answers and make sure to not use common references)

Question 12: Write a 400+ word essay (APA format & 2 latest scholarly journal article references 2016 on words) 

Chapter 15 – From the week’s chapter reading, we learn from the author’s case studies that, despite the alleged importance of scientific advice in the policy-making process, its evident that scientific results are often not used.  Why? The authors proposed a science-policy interface that would be realized by the inclusion of information visualization in the policy analysis process.  That way, the gap between both fields can be addressed based on the current challenges of science-policy interfaces with visualizations. 

Q1: According to Shneiderman and Bederson (2003), information visualization emerged from research in human-computer interaction, computer science, graphics, visual design, psychology, and business.  With this revelation in mind, identify, and discuss the benefits?

refer chapter 15 in 2015_Book_PolicyPracticeAndDigitalScienc.pdf (attached)

Question 13: (need 2 copies of answers and make sure to not use common references)

Write a 400+ word peer reviwed assignment (APA format & 2 latest scholarly journal article references 2016 on words) 

Chapter 16 – Following the chapter reading, the authors assert that the twentieth century is considered as the century of population explosion and fossil fuel burning, environmental policies and the transition to effective use of renewable energy sources as a priority with a strategic focus on specific countries around the world.  In addition, this move has created several different projects whose main focus is to formulate policies associated with climate change and energy governance.  Many of the policies and projects identified aim to support the energy sources switching between fuels like fossils and nuclear power to renewable like solar, wind, and or water.  Specifically, the chapter provides the foundations of policy implementation, and methods as well as investigations of five policy implementation case studies through a comparative analysis. 

Q1: Looking further into the chapter, theoretical grounds of policy implementation, Buse et al., (2012) argue that policy implementation is the execution of a formulated policy – turning theory into practice.  When turning theory into practice, the authors stated that it was common for certain observations.  What are those observations? 

refer chapter 16 in 2015_Book_PolicyPracticeAndDigitalScienc.pdf (attached)

Question 14: 12+ page research paper (need 2 copies of answers and make sure to not use common references)

Topic: Information Technology importance in a Global Economy

The Final papers should contain a title page, TOC, abstract, introduction/topic paragraph, summary/conclusion, and references page.

Skill builder #4 | Management homework help

NSTRUCTIONS: This is a writing assignment that covers the assigned materials (readings, videos, lectures, etc.) for Module 5. Download the Skill Builder #4 assignment template (the link is found below), then write your answers directly into that template (it is a WORD file). Write a minimum of 200 words for each question. Save your changes, then rename the WORD document file as follows: LASTNAME_SB4.docx (your last name followed by an underscore, then the SB1 indication). Then upload the completed assignment to Moodle. This is a TURNITIN assignment on Moodle, which means that when you submit it, you will be submitting it to TURNITIN, and thus receive an originality report indicating possible plagiarism or cheating (there have been problems in the past with students copying the work from past students, or copying from materials previously posted on the internet). You may keep uploading versions of your assignment until you are satisfied with your TURNITIN Originality Report. Remember, you may only obtain a TURNITIN Originality Report once every 24 hours; so allow yourself plenty of time to resubmit if necessary.

This is a Socratic exercise – an opportunity for you to think and express your thoughts. This assignment is a reflection of the degree to which you are engaged in the course material, and how well you learned the topics assigned this week. The emphasis of this assignment is synthesis – the connecting of dots – where you tie together in a meaningful way (1) the assigned readings and videos, (2) current business and world events, and (3) your previous knowledge and experience. There is no correct or incorrect answer, but rather YOUR answer, based on YOUR thoughts and understanding of the material/concepts.


1. WATCH: videos / read attachments

2. READ: skill builder #4 QUESTIONS then

3.  fill out the TEMPLATE 

4.. PROVIDE: references from the module videos and readings attached



READ: Web Site Review: Take 20 minutes and explore website of Stanford’s Design School (especially “Our Way of Working”)

READ: Skim over Stanford”s “Bootcamp Bootleg” (for PDF, click this link) BootcampBootleg.pdf – Alternative Formats

READ: Skim over Stanford”s “Mixtape1: Understanding” (for PDF, click this link) understand-mixtape-v8.pdf – Alternative Formats

READ: Skim over Stanford”s “Mixtape2: Experiment” (for PDF, click this link) 

READ: Skim over Stanford”s “Mixtape3: Ideate” (for PDF, click this link) 


READ: “Innovator’s Method” book, Ch 3, p67-84 (Insight: Savor Surprises) (click here for optional 7-min video lecture)

READ: “Innovator’s Method” book, Ch 4, p85-110 (Problem: Discover the Job-to-be-Done) (click here for optional 13-min video lecture)

What is Creativity? (Bob Sutton) [6 min]

Google and Ideas [3 min]

The Psychology of Creativity: The Good, the Bad, and the Ugly [7 min]

Creative Thinking [13 min]

Collective Creativity [15 min]

Turn Your Office into a Creative Space [3 min]

Brainswarming: Because Brainstorming Doesn’t Work [3 min]

Build Confidence to Unleash Creativity [5 min]

Comm theory – gender differences/listening skills

Please see below the discussion question. YOU MUST REFERENCE THE SOURCE MATERIAL ATTACHED AND INCLUDE IN-TEXT CITATION. The assignment only needs to be 1 page.

Discussion 5.2 – Applying Our Understanding of Effective Listening Skills

Background: Please begin this exercise by reading the following information carefully.

Research on adults’ listening styles by Sargent and Weaver (2003) and others suggests that women use their listening skills to learn about people and to make connections with others, while men listen more for information and to solve intellectual challenges. The findings do not mean women do not engage in content-oriented listening and that men do not engage in people-oriented listening. Both sexes clearly engage in both types of listening. However, Sargent and Weaver and other researchers say findings like these indicate that women and men generally do, indeed, have different approaches to listening.


How might you apply this information about sex differences in listening styles to your communication in the workplace*?

(*Remember, if you are not employed or cannot discuss your workplace, you may draw upon your experiences in another organizational setting in which you are involved, such as a school, church, or community group.)