Author: admin

  • “Exploring the Impact of Construal Level on Sexual Health Decision Making among College Students: An Experimental Study on Vaccination Outcomes”

    My assignment is an experimental research paper on Construal Level theory and decision making. I have chosen the topic of  “Sexual Health Decision Making among college students: An Experimental Study Exploring Vaccination Outcomes using Construal Level Theory.” Below I have attached my study design, some measurements scales, a little bit of introduction and some references. The references that have the * symbols are important. Please review and correct my study design if you do not agree with it. My professor is really strict on data analysis and methods, he would like to see G power analysis and basically my thinking behind my choices. I have also attached the official document with instructions and these two articles have been used in class to talk about Construal Level theory.
    Lee, S. J. (2019). The role of construal level in message effects research: A review and future directions. Communication Theory, 29(3), 319-338. https://doi.org/10.1093/ct/qty030
    Fujita, K., Trope, Y., & Liberman, N. (2015). On the psychology of near and far. The Wiley Blackwell Handbook of Judgment and Decision Making, 404-430. https://doi.org/10.1002/9781118468333.ch14

  • “The Journey of a Recent Graduate: A Story of Determination and Growth” The sun was setting on a warm summer evening as 21-year-old Emily walked across the stage, diploma in hand. She couldn’t believe that after four years of

    so since you dont know me its hard to write this assignmnet. I was linked below a past assignemnt so you can get to know my journey. feel free to make up a story. im a 21 year old female who just graduated college to help. feel free to reach out to me while writting this would love to help

  • “Exploring the Purpose and Justification of Gender Labels: A Comparative Analysis of Devor, Blum, and Tannen”

    For this essay, you will be using two sources. The primary source that must be included, in your essay is: – Aaron Devor’s “Gender Role Behaviors and Attitudes” For the secondary source, you have a choice of either: – Deborah Blum’s “The Gender Blur: Where Does Biology End and Society Take Over” OR – Deborah Tannen’s “There is No Unmarked Woman” Prompt (4 pages minimum) Devor, Blum, and Tannen all discuss labels that society uses to define masculinity and femininity. Specifically, all three authors discuss labels that deal with gender and gender expression. They all create unique arguments on the purpose of these labels and whether they are (or can be) justified. Using Devor as your primary source, you must argue whether Blum, Tannen support, refute, and/or complicate Devor’s discussion of gender performance and expression. Use rhetorical strategies/rhetorical devices and textual evidence to support your answer.

  • Title: The Influence of Media on Personal Opinions: A Study of Six Online News Articles 1. Article: “Climate change: Earth’s giant carbon sinks are starting to fill up” by Matt McGrath, BBC News (https://www

    Select six online news articles from different sources dealing with material we have covered in this course. For each one, provide a citation or link (not the whole article!) and do all of the following for each one: (1) explain the article, (2) evaluate how or whether the article tries to influence your personal actions or opinion of the subject matter, and (3) explain how the course material clarified your understanding of the article and any attempt that it makes to influence you personally. Your articles should have enough substance to sustain the analysis, so stay away from short blurbs. 

  • “Developing a Risk Management Plan for Project X”

    The objective of this assignment is to develop a risk management plan for a given project. Students will learn how to identify, assess, and manage risks associated with the project, and develop strategies to mitigate or avoid those risks.
    Instructions:
    Identify the risks: Identify potential risks associated with the project. These could include technical risks, financial risks, legal risks, environmental risks, or any other risks that may be relevant to the project.
    Assess the risks: Once you have identified the risks, assess their likelihood and potential impact on the project. Use a risk matrix or any other risk assessment tool to rank the risks according to their severity.
    Create a risk register based on the identified risks.
    Develop a risk management plan: Based on the results of the risk assessment, develop a risk management plan. This should include strategies to mitigate or avoid the identified risks, as well as contingency plans in case the risks materialize.
    Present your plan: Present your risk management plan in a presentation. The presentation should include: 
    An introduction to the project
    A summary of the identified risks
    The results of the risk assessment
    The risk management strategies you have developed. 
    Note: Be sure to include any relevant diagrams or charts (see the risk management templates in Module 8) to support your findings in your presentation. 
    Deliverable:
    Presentation on Risk Management for your project
    Your presentation should contain at least 4 slides that correspond with the sections listed above. Include a paragraph of speaker’s notes for each slide.

  • The Importance of Identity in Agatha Christie’s “Miss Marple” In the article “Miss Marple and the Problem of Modern Identity,” the author discusses the theme of identity in Agatha Christie’s novel “A Murder is Announced.” The

    Consider the ideas about identity presented in the article, “Miss Marple and the Problem of Modern Identity.” Use at least two quotes from the article to identify how the notion of identity is important in the Christie novel. How do we know who someone is? Drawing on your life experience and information you have learned in other classes, reflect on how this theme of identity is important or not important to our way of life. For your discussion post a 250-275 word reaction to the prompt.  Please note, you must first post your answer before you can see classmates’ posts. 
    After completing your initial post, return to this discussion forum and respond to at least two classmates, 50-100 words each. This response should include commonalities, connections, and reference to comments that are of interest.

  • “Expanding Impossible Foods: Evaluating Market Entry Modes for International Expansion into Guyana”

    In the readings and videos this week you are exposed to information about international expansion: market entry modes.
    Impossible Foods is on a mission to get the world to eat its plant-based meat products. Currently, the company’s products are only available in a few select markets, but it is looking to expand its footprint, specifically to the nation you chose in Week 1. If Impossible Foods has already entered the nation (Guyana is the nation I chose) you chose in week 1, please choose another nation for this assignment. As discussed in this week’s module, there are several entry modes available for firms that are looking to expand globally. 
    For this forum,  answer the following questions using the textbook, other module materials, and additional company research as needed:
    List the five common international entry modes, as well as some advantages and disadvantages of each mode.
    What do you believe the company’s core competency is? Name and explain it.
    What entry mode do you believe the company should use to enter your nation’s market?
    What makes this superior to the other modes?
    What are the specific advantages of this entry method?
    What are the specific disadvantages of this entry method?
    Why are you excluding the other market entry strategies? Focus on the disadvantages of these entry modes.
    Be sure that you reference the module materials to develop your position and support your statements. Use APA citations and references.
    Please review the Discussion Forum guidelines for the expectations and assessment criteria. You must post your response first before you will be able to see what others have written. 
    In this module you will be required to: 
    Read: Global Business Management, Chapter 10: sec. 10.1-10.3 only 
    Read: Global Business Management, Chapter 11 (all) 
    Read: Assigned articles: “International Expansion” and “Boost Your Bottom Line with These Export Tips from the U.S. Commercial Service”
    Review: PowerPoint presentation

  • Title: “Exploring the Impact of AI in Healthcare on Elderly Care: A Study of Challenges and Opportunities” Introduction: The use of Artificial Intelligence (AI) in healthcare has been rapidly increasing in recent years, with the potential to revolutionize

    Module 5: The Problem/Puzzle
    Write up a 4-page mini-proposal for the Doctoral Study you are thinking about doing at this point in time.
    What is the tentative title of your study?
    Explain what is driving your interest in your business research topic.
    Define the business problem you have identified that your research might address or help resolve.
    What puzzle about your area of interest do you want to solve?
    Propose a set of RQ’s (5-10) which you will eventually reduce to 1 or 2.
    Doctoral Study: AI in Healthcare and it’s effects on Elderly Care

  • Title: “Disrupting the American Dream: A Critical Look at Edward Hopper’s ‘Nighthawks’” As I walked through the halls of the North Carolina Museum of Art, I couldn’t help but feel a sense of unease

    Write a visual analysis (description) for a work of Art at the North Carolina Museum of Art. I would like for you to focus on American Art.  
    CHOOSE AN ARTWORK by an AMERICAN ARTIST Made between 1900 and the PRESENT DAY
    that you strongly dislike or that irks you for this assignment. 

  • Title: Incident Analysis Brief: Strengthening Cybersecurity Posture Through Fundamental Security Design Principles Scenario Analysis and Recommendations for Implementing Fundamental Security Design Principles in an Organization

    Overview
    This project is to create an incident analysis brief for your manager. Cybersecurity incidents will occur regardless of the level of protection and prevention an organization has in place. The response to the incident is what may make or break an organization. As you progress through your degree, you will build your skills to address all stages of incident response: preparation, detection and analysis, containment, eradication and recovery, and post-incident activity.
    A critical aspect of incident response is using the information gained from an incident to improve the organization’s security. The insight helps security professionals develop solutions that reduce the likelihood of similar incidents in the future. It also helps balance the potential negative impacts on the people, processes, and technologies the solutions ultimately affect. In this project, you will examine a past incident and use the Fundamental Security Design Principles to develop recommendations that will protect the organization in the future.
    In this assignment, you will demonstrate your mastery of the following course competency:
    Describe fundamental principles of cybersecurity
    Scenario
    In a course announcement, your instructor will provide you with a scenario to base your work on. In the scenario, you are a security analyst creating an incident analysis brief that explains to the security or IT director explaining how to apply the Fundamental Security Design Principles to strengthen the organization’s security posture following the incident described in the case. The scenario will provide all the specific technical information you need for your brief. You should address each critical element in the Project Two prompt, speaking broadly to your analysis and recommendations based on your research from the course materials in previous modules.
    Prompt
    Using evidence from the scenario, prepare an incident analysis brief for your manager. Limit your analysis to one security objective and two Fundamental Security Design Principles from the lists below.
    Security Objective (Choose One):
    Confidentiality
    Integrity
    Availability
    Fundamental Security Design Principles (Choose Two):
    Separation (of domains and duties)
    Isolation
    Encapsulation
    Modularity
    Simplicity of design (economy of mechanism)
    Minimization of implementation (least common mechanism)
    Open design
    Complete mediation
    Layering (defense in depth)
    Least privilege
    Fail-safe defaults and fail secure
    Least astonishment (psychological acceptability)
    Minimization of trust surface (reluctance to trust)
    Usability
    Trust relationships
    Specifically, you must address the critical elements listed below:
    Scenario Analysis: Using your work in the case study analyses (Modules Two through Four) and other course resources as reference, select the security objective you think is most relevant to the organization in the case.Describe why the loss of your selected security objective (confidentiality, integrity, or availability) reflects the greatest overall negative impact on the organization. Use evidence from the scenario and your coursework to support your selection.
    Summarize the negative impacts on people, processes, and technologies associated with the loss of your selected security objective.
    Recommendations: Select two Fundamental Security Design Principles as criteria, and recommend solutions to remedy the loss of the selected security objective based on your assessment of the incident.Explain how your solution implements the selected Fundamental Security Design Principles. Provide evidence from the scenario and your coursework to support your selections.
    Describe how your solution balances impacts on people, processes, and technologies.
    Explain which aspect of your solution you would recommend to your manager as the most important to the organization. Support your response with evidence from the coursework or scenario
    What to Submit
    Your submission should be 3 to 5 pages in length (plus a cover page and references) and should be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Include at least three references, which should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_200_Project_Two_Neo_Anderson.docx.
    Project Two Rubric
    CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
    Scenario Analysis: Greatest Overall Negative ImpactMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes why the loss of the selected security objective reflects the greatest overall negative impact on the organization with evidence from the scenario and coursework to support the selectionAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
    Scenario Analysis: Negative ImpactsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerSummarizes the negative impacts on people, processes, and technologies associated with the loss of the selected security objectiveAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
    Recommendations: Implementation of Fundamental Security Design PrinciplesMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains how the solution implements the selected Fundamental Security Design Principles with evidence to support the selectionsAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
    Recommendations: Balancing ImpactsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes how the solution balances impacts on people, processes, and technologiesAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
    Recommendations: Importance to OrganizationMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains which aspect of the solution is most important to the organization with evidence to support the explanationAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
    Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, or organizationSubmission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas5
    Total:100%