Author: admin

  • Title: “Reflecting on Personal Growth: A Journey through the Gibbs Reflective Cycle”

    Its a reflective essay using the Gibbs Reflective cycle
    Reference style :
    Harvard
    Number of references :25
    And 
    page numbering 
    Line spacing is 1.5

  • “Evaluating the Use of RFID Wristbands for Children’s Purchases at Hotel-Sponsored Events” “Security and Privacy Considerations for Implementing an Event Management Platform with RFID Technology: A Comprehensive Report for Padgett-Beale’s IT Governance Board” “Navigating the Legal and Ethical Boundaries of Competitive Intelligence: Protecting Intellectual Property and Preventing Data Exfiltration”

    Scenario
    The Entertainment Team (ET — part of Resort Operations
    at Padgett-Beale, Inc.) is excited about a new event management platform and is
    ready to go to contract with the vendor. This platform is a cloud-based service
    that provides end-to-end management for events (conferences, concerts,
    festivals). The head of Marketing & Media (M&M) is on board and
    strongly supports the use of this system. M&M believes that the data
    collection and analysis capabilities of the system will prove extremely valuable
    for its efforts. Resort Operations (RO) also believes that the technology could
    be leveraged to provide additional capabilities for managing participation in
    hotel sponsored “kids programs” and related children-only events.
    The arm of a hotel guest wearing an RFID band while
    sitting poolside
    For an additional fee, the event management platform’s
    vendor will provide customized Radio Frequency Identification (RFID) bands to
    be worn by attendees. 
    The RFID bands and RFID readers use near-field
    communications to identify the wearer and complete the desired transactions
    (e.g. record a booth visit, make a purchase, vote for a favorite activity or
    performer, etc.).
    The RFID bands have unique identifiers embedded in the
    band that allow tracking of attendees (admittance, where they go within the
    venue, what they “like,” how long they stay in a given location,
    etc.). 
    The RFID bands can also be connected to an attendee’s
    credit card or debit card account and then used by the attendee to make
    purchases for food, beverages, and souvenirs. 
    For children, the RFID bands can be paired with a
    parent’s band, loaded with allergy information, and have a parent specified
    spending limit or spending preauthorization tied to the parent’s credit card
    account.
    The head of Corporate IT has tentatively given approval
    for this outsourcing because it leverages cloud-computing capabilities. IT’s
    approval is very important to supporters of this the acquisition because of the
    company’s ban on “Shadow IT.” (Only Corporate IT is allowed to issue
    contracts for information technology related purchases, acquisitions, and
    outsourcing contracts.) Corporate IT also supports a cloud-based platform since
    this reduces the amount of infrastructure which IT must support and manage directly.
    The project has come to a screeching halt, however, due
    to an objection by the Chief Financial Officer. The CFO has asked that the IT
    Governance Board investigate this project and obtain more information about the
    benefits and risks of using RFID bands linked to an external system which
    processes transactions and authorizations of mobile / cashless payments for
    goods and services. The CFO is concerned that the company’s PCI Compliance
    status may be adversely affected.
    The Chief Privacy Officer has also expressed an objection
    about this project. The CPO is concerned about the privacy implications of
    tracking both movement of individuals and the tracking of their purchasing
    behaviors.
    The IT Governance Board agreed that the concerns
    expressed by two of its members (the CFO and CPO) have merit. The board has
    requested an unbiased analysis of the proposed use cases and the security and
    privacy issues which could be reasonably expected to arise. 
    The IT Governance Board has also agreed to a request from
    the Chief of Staff that the management interns be allowed to participate in
    this analysis as their final project. Per the agreement, their involvement will
    be limited to providing background research into the defined use cases for
    cashless purchases.
    Case:
    Task
    Purchases for craft
    materials and snacks by children (under the age of 13) attending a hotel
    sponsored “kids club” program.
    Research one or more of the Use Cases
    E. (2024, June 17). What benefits of RFID wristbands for
    hotels, resorts & theme parks? RFIDSilicone. Retrieved June 17, 2024, from https://www.rfidsilicone.com/blog/industry-news/what-benefits-of-rfid-wristbands-for-hotels-resorts-theme-parks.html
    (see section 4: Family Freedom)
    Zougar, Y. (2018, July 27). An introduction to RFID.
    INFOSEC. Retrieved June 13, 2024, from https://www.infosecinstitute.com/resources/general-security/an-introduction-to-rfid/#:~:text=RFID%20stands%20for%20Radio%20Frequency,order%20to%20transmit%20and%20receive
    A. W. (2019, June 15). TAPPIT LAUNCHES NEW RFID WRISTBAND
    SAFETY FUNCTIONALITY. TAPPIT. Retrieved June 17, 2024, from https://tappit.com/resources/blog/rfid-wristband-safety
    4. Find and review at least two additional
    resources on your own that provides information about privacy and security
    related laws that could limit or impose additional responsibilities upon
    Padgett-Beale’s collection, storage, transmission, and use of data about
    guests. (Note: laws may differ with respect to collecting data from or about
    children.) You should also investigate laws, regulations, or standards which
    impact the use of the RFID bands for mobile purchases.
    5. Using all of your readings, identify and
    research at least 7 security and privacy issues which the IT Governance Board
    needs to consider and address as it considers the implications of your chosen
    use case upon the adoption or rejection of the proposed IT project (Event
    Management Platform & RFID bands).
    6. Then, identify 7 best practices that you can
    recommend to Padgett-Beale’s leadership team to reduce and/or manage risks
    associated with the security and privacy of data associated with the event
    management platform.
    Write
    Write a five to seven (5-7) page report using your research.
    At a minimum, your report must include the following:
    An introduction or overview of event management systems and
    the potential security and privacy concerns which could arise when implementing
    this technology.  This introduction
    should be suitable for an executive audience. Provide a brief explanation as to
    why three major operating units believe the company needs this capability.
    An analysis section in which you address the following:
    Identify and describe your chosen Use Case
    ·        
    Identify and describe 7 or more types of
    personal / private information or data that will be collected, stored,
    processed, and transmitted in conjunction with the use case.  
    ·        
    Identify and describe 5 or more compliance
    issues related to the use of the RFID bands to make and track mobile purchases.
    ·        
    Analyze and discuss 7 or more privacy and
    security issues related to the use case.
    ·        
    Identify and discuss 3 or more relevant laws,
    regulations, or standards which could impact the planned implementation of the
    event management system with RFID wrist bands.
    A recommendations section in which you
    identify and discuss 8 or more best practices for security and privacy that
    should be implemented before the technology is put into use by the company.
    Include at least 2 recommendations in each of the following categories: people,
    processes, policies, and technologies.
    A closing section (summary) in which you summarize
    the issues related to your chosen use case and the event management platform
    overall. Include a summary of your recommendations to the IT Governance Board.
    Must incorporate at least 5 of these resources into
    your final deliverable. You must also include 2 resources that you found on
    your own.
    Research report should use standard terms and definitions
    for cybersecurity.
    References
    GOV, U. (n.d.). Protecting Intellectual Property in the
    United States: A Guide for Small and Medium-Sized Enterprises in the United
    Kingdom. STOPfakes:Uspto.gov. Retrieved June 9, 2024, from https://www.uspto.gov/sites/default/files/documents/UK-SME-IP-Toolkit_FINAL.pdf
    Alto, P. (n.d.). What is an Exploit Kit? Palo Alto.
    Retrieved June 9, 2024, from https://www.uspto.gov/sites/default/files/documents/UK-SME-IP-Toolkit_FINAL.pdf
    Z. (n.d.). Anatomy of APT: Advanced Persistent Threat
    Guide. Zenarmor. Retrieved June 9, 2024, from https://www.zenarmor.com/docs/network-security-tutorials/what-is-advanced-persistent-threat-apt
    Limacher, M.,
    & Fauconnet, L. (n.d.). The Legal and Ethical Guardrails for Sound
    Competitive Intelligence. Pragmatic Institute. Retrieved June 13, 2024, from https://www.pragmaticinstitute.com/resources/articles/product/the-legal-and-ethical-guardrails-for-sound-competitive-intelligence/
    Radar, C. (n.d.). The Legal and Ethical Guardrails for
    Sound Competitive Intelligence. CI Radar. Retrieved June 13, 2024, from https://ciradar.com/competitive-intelligence-blog/insights/2017/12/22/the-ethics-of-competitive-intelligence-where-uber-crossed-the-line
    Zougar, Y. (2018, July 27). An
    introduction to RFID. INFOSEC. Retrieved June 13, 2024, from https://www.infosecinstitute.com/resources/general-security/an-introduction-to-rfid/#:~:text=RFID%20stands%20for%20Radio%20Frequency,order%20to%20transmit%20and%20receive
    Awati, R. (2022, June 12). Segregation of duties (SoD).
    WHATIs. Retrieved June 13, 2024, from https://www.techtarget.com/whatis/definition/segregation-of-duties-SoD
    Counsel, U. (2022, October 27). Intellectual Theft:
    Everything You Need to Know. UpCounsel. Retrieved June 9, 2024, from https://www.uspto.gov/sites/default/files/documents/UK-SME-IP-Toolkit_FINAL.pdf
    Miller, M. (2023, June 13). What Is Least Privilege &
    Why Do You Need It? BeyondTrust. Retrieved June 13, 2024, from https://www.beyondtrust.com/blog/entry/what-is-least-privilege
    S. (2023, June 27). Data Exfiltration: Prevention, Risks
    & Best Practices. Splunk’. Retrieved June 9, 2024, from https://www.splunk.com/en_us/blog/learn/data-exfiltration.html
    M. D. (2023, August 31). An IP Guide for the Corporate
    Legal Practitioner: IP Theft and the Major Threats to Your Client’s IP.
    DILWORTH. Retrieved June 13, 2024, from https://www.dilworthip.com/resources/news/threats-to-intellectual-property/
    A. W. (2023, October 3). The Top 3 Cyber Attack Vectors.
    ARTICWOLF. Retrieved June 9, 2024, from https://arcticwolf.com/resources/blog/top-five-cyberattack-vectors/

  • Title: “Improving My Physical Activity: A Personal Behavior Change Journey” Introduction: As individuals, we all have areas of our lives that we would like to improve. One area that I have identified for myself is my physical activity level.

    For this project you will be required to select a personal behavior change and write a 1000 word essay. Please remember: weight loss is NOT a behavior change; it is the result of one or more changes. Therefore, weight loss is not an appropriate topic for this assignment. The essay must include an Introduction paragraph, Body and Conclusion paragraph with a minimum of 3 references from peer-reviewed database articles. Unfamiliar with peer-reviewed research articles? Click on What Does Peer-Reviewed Mean in this module. To find peer-reviewed research, click on Library / Databases in this module, then click on Search the Databases. If you are unfamiliar with databases and need help, click on Chat / Text with the Librarian
    Choose a health behavior you would like to change in any of the dimensions of wellness. If you are stuck and cannot think of a behavior change, try completing the Evaluated Your Lifestyle Quiz provided in this module or search for health assessments online.
    Write a 1000-word essay that includes the following:
    The results of any assessment you took and the area that you would like to improve.
    A clearly stated goal that demonstrates use of the SMART principles of goal-setting.
    The strategies that you plan to use to improve your chosen health behavior. Your strategies should be specific with a clear implementation timeline.
    A discussion as to how each of the dimensions of wellness are impacted by the area that you would like to improve.

  • “Choosing Your Path: The Debate between Entering the Workforce or Pursuing Higher Education after High School”

    This essay will be a 7 paragraph argumentative. Argue wether going into the work force or college after high school is the better option. Sources will be provided. Mla format with in text citations and sources page required.

  • Title: Overcoming Bias in Investigative Profiling and the Evolution of Technology in Criminal Investigations

    This written assignment consists of two essay questions. Students are expected to develop a 2-3 page essay per question(excluding title and reference page). A minimum of 2 peer-reviewed, scholarly sources per question are to be utilized for the assignment. Sources should also be up-to-date (less than 10 years old). Direct quotes are not permitted.
    Topic 1: Profiling involves allowing the physical evidence to reveal to an investigator what behaviors occurred, then thinking about what was intended by the commission of those behaviors. It has been proven time and time again that the majority of investigators are chronically unable to overcome their own perspectives and biases when faced with one or more disturbing violent crime scenes. How do you feel the investigative community can overcome these negative outcomes?
    Topic 2: Discuss, in detail, how technology has evolved over the past 20 years in regards to criminal profiling and forensic science, and the way it is being used successfully today by law enforcement.
    Citations/References: You must use proper APA format for citations and reference listings.

  • “The Treaty of Troyes: A Historic Accord to End the Hundred Years’ War” Title: The Treaty of Troyes: Reinvigorating the Hundred Years’ War and the Dauphin’s Cause The Treaty of Troyes, signed in 1420, was a significant event in the Hundred Years’ War between England

    1-Create a 350 to 400 word article disccussion post on the following: Treaty of Troyes and use the following article to write the post: 
    Treaty of Troyes: Hundred Years’ War
    General Resources – Reference Articles
    Concluded in May 1420 at Troyes, a town on the Seine in northeastern France, the Treaty of Troyes was a historic Anglo-French accord whereby Henry V of England became regent and heir to the throne of France. By creating the prospect of a dual monarchy within the English House of Plantagenet, the treaty promised an end to both the Hundred Years’ War and the French Civil War.
    In the spring of 1418, John the Fearless, Duke of Burgundy, recaptured Paris, driving out Dauphin Charles and his Armagnac supporters and regaining custody of Charles VI. Since the English victory at Agincourt in 1415, the civil war between Burgundians and Armagnacs had divided the French nobiility. In September 1419, during the Montereau Conference to discuss reconciliation, the dauphin’s men murdered John, thereby thrusting Philip III (“the Good”), the new duke of Burgundy, into firm alliance with England and allowing Henry to denounce the dauphin as unfit to inherit the Crown of France.
    On December 2, after a month of negotiations with the English, Philip announced his willingness to recognize Henry as Charles’s rightful heir. Although ambivalent about the prospect of English rule, Philip found it preferable to acknowledging his father’s murderer as king. In January 1420, Henry dispatched representatives to the French court in Troyes and authorized them to draft a formal agreement. This document was ready by early May, when all parties agreed to meet in Troyes to ratify the treaty.
    Largely dictated by Henry, the terms of the agreement called for his marriage to Charles’s daughter, Catherine of Valois, whom Henry took without a dowry; his recognition as Charles’s heir in place of the dauphin, who was thereby disinherited; and his exercise of the French regency until Charles’s death. The treaty envisaged a union of Crowns, a dual monarchy, not a union of kingdoms. France and England would retain separate administrations, laws, and institutions, but the dispute over the French Crown and over the status of English territories in France would be resolved—the king of England and his heirs would rule all.
    On May 20, Philip met Henry outside Troyes and conducted him to a meeting with Charles, his wife Queen Isabella of Bavaria, and their daughter Catherine. Next day, Henry arrived at St. Peter’s Cathedral in Troyes with a party of about 400. Isabella and Philip, acting as deputies for Charles, who was too ill to attend, led a French party of similar size. The text of the treaty was read at the high altar, each party giving assent thereto, and the seals of each king were affixed to the document, with Henry employing the seal Edward III had used to ratify the Treaty of Brétigny 60 years earlier. Led by Philip, the nobles present swore to uphold the treaty (that is, to recognize Henry as heir to the throne) and to obey Henry as regent. Peace between the two realms was then officially proclaimed in both French and English. Next, Henry and Catherine were solemnly betrothed, with the wedding ceremony following on June 2 at the Church of St. John in Troyes.
    The treaty was widely if not enthusiastically accepted in Paris and most of the English and Burgundian regions of northern France, where war weariness and economic distress made the conclusion of peace, on whatever terms, a welcome prospect. However, in most of the realm south of the Loire, loyalty to the dauphin was equally widespread, if often equally unenthusiastic, and the treaty was repudiated there as a settlement forced upon a captive king. How well the treaty would have worked is hard to say, for, to everyone’s surprise, Henry predeceased his father-in-law, dying at the end of August 1422. When Charles VI died in the following October, the Treaty of Troyes made a nine-month-old infant, Henry VI, ruler of both kingdoms, a circumstance that reinvigorated both the war and the dauphin’s cause.
    John A. Wagner
    Further Reading
    Allmand, Christopher. Henry V. Berkeley: University of California Press, 1993; Perroy, Edouard. The Hundred Years War. Translated by W. B. Wells. New York: Capricorn Books, 1965.
    MLA Citation
    Wagner, John A. “Treaty of Troyes: Hundred Years’ War.” World at War: Understanding Conflict and Society, ABC-CLIO, 2024, worldatwar2.abc-clio.com/Search/Display/1611785. Accessed 19 June 2024.
    Additionally, Your article discussion post  discusses  the information supplied in the reference article  plus finding one other source (Preferably a primary source)  along with the last paragraph of your post is explaining what you learned about this event, era and military history. 
    Incorporate the following as well: You will discuss:
    Who was involved?
    What happened?
    When did it happen?
    Where did it happen?
    How did the action develop?
    Why did things progress as they did?
    What was the significance of the action?
    While answering these questions in your post, you will take in consideration : Military theory and doctrine, Military professionalism, Strategy, Tactics, Logistics and Administration, Technology, Political factors/Diplomacy, Social factors/Culture/Religion, and Economic Factors.
    2-Create a 350 to 400 word writing assistance research involves researching a battle or a military engagement and  writing a  detailed summary writing assistance.  The writing assistance  will focus one one Ancient (Before the Fall of Rome)  battle or military engagement that you researched. 
    You must reference using one of the three formats and following your major’s designated style:  APA MUST CITE YOUR SOURCES! 
    The following should be addressed in your writing assistance:
    Describe the historical context in which the battle occurred.
    Describe the key leaders for both sides of the battle and the decisions they made which affected the outcome of the battle.
    Describe the military groups, discussing the types of soldiers/sailors, the numbers who fought, specific groups for both sides of the battle.
    Describe the technology used, the weapons and new items introduced to this battle.
    Address the who, what, when, where and whys.
    Include influences- how the conflict affected the entire global society, politics, economics, the people and the culture
    Address the overall significance of the battle in regards to the outcome of the larger conflict.
    YOU CHOOSE the battle as long as it follows the guidelines of a battle before  476 A.D.
    YOU MUST USE A CREDIBLE SOURCE AND REAL AND VERIFIABLE REFERENCE THAT IS SCHOLARLY SOURCE.
    3- Create a 300 word discussion post on the following: Find a news article or government report from the last four weeks that demonstrates the policy process in action, and then explain how and which part of the process it demonstrates. The article must be about any country other than the United States.
    You must provide references and sources. 
    DO NOT USE AI. YOU MUST PROVIDE A TURNITIN AI REPORT>

  • “Team Wellness Center Reflection Presentation”

    My paper is complete so I need it to reflect off of that  and the notes and study I took at team wellness center the notes can all be on 1 slide with info all on other slides 

  • “Revamping Employee Benefits: A Strategic Approach for Company Growth and Retention”

    The information about the company’s current benefits and employee demographics are attached. Use external resources to find trending benefit information.
    You have been hired by our fictitious company as the lead of HR. Your first assignment is to review the current benefits package (which has not been reviewed for a long time) and come up with a totally new or revised benefit package.
    You will need to prepare a written presentation for the CEO and Board Members. Tell them what you think should be changed and why (always remember the why). Also note that as you’re talking the audience will be thinking… how does this affect our budget? You will need to be proactive and address this before they ask!

  • Title: “Exploring Wine Quality: A Data Storytelling Journey”

    Step 1- Your task is to do initial analysis on your data in Tableau. Create some visuals, considering how you might tell a story with this data. Create at least four visualizations. Only one may be a table. Create a draft dashboard with these visuals.
    Submit three things:
    A pdf file of your draft dashboard
    A one page write-up (use Word) explaining how you your dashboard tells a story
    The link to your Tableau Public dashboard
    Use the data from the wine quality.
    Step 2- Consider adding some more advanced features.  You will be telling a story with your dashboard in Tableau, just as if you were presenting information to stakeholders or an audience.
    Create a PowerPoint presentation. It should include:
    Introduction: Introduce the data you are using and the purpose of your dashboard
    Methodology: What methods did you use to analyze the data being presented?
    Key findings: What do you want the audience to know? What are the major takeaways from your visuals?
    Presentation: Screen recording a demonstration of your dashboard and your data story
    Link to Dashboard: provide the Tableau Public link to your final dashboard
    Use the data from the wine quality for both of these steps. FOllow the criteria rubric from step 2 only.

  • Title: “The Impact of Admitting Psychiatric Patients on General Medical Surgical Units: Nurses’ Care, Hospital Readmissions, and Tools for Effective Management”

    Please use 3 scholarly and peer reviewed questions to answer the questions listed below. Thank you and please let me know if you have any questions!
    How does admitting patients with psychiatric disorders or problems on a general medical surgical unit affect the way nurses provide care, if certain patients do not fit the criteria to be on a psychiatric unit due to their medical condition, disease, acute or chronic disorders?
    How does having a psychiatric patient on a general medical surgical unit affect the hospitals, when patients decide to leave against medical advice and return within a 30 day period as a readmission?
    What are some tools that can be used to help in determining the best plan of care or action for patients with psychiatric conditions on a general medical surgical unit? And how can these tools aid in reducing readmissions in the hospital for these types of patients?
    How will these tools and studies help medical surgical nurses feel more safe and comfortable when providing care to psychiatric patients that they are not used to taking care on an everyday basis?