Category: Information ethics

  • “Business Plan for Opening a Childcare Center in [City Name]”

    Hide Assignment Information
    Turnitin™
    This assignment will be submitted to Turnitin™.
    Instructions
    This assignment requires the Development of a Business Plan to open a Childcare Center in your city. A business plan is an essential roadmap for a Childcare Center’s success. It has several specific requirements. Be sure to read the instructions thoroughly. This is a long-term assignment and requires research. Please be sure to start immediately.
    Business Plan Instructions:
    Below you will find specific requirements to include in your final Business Plan for opening a Childcare Center in the city in which you reside. Please be sure that your work is original in nature. No part of your assignment can be copied from any internet or outside source.  Content generated by Artificial Intelligence is not permitted for this assignment and will be addressed via the Code of Conduct. 
    Provide a detailed description of the child care center to include the physical space and who the center will serve
    Identify the resources you are using to develop your plan.
    Identify all staff that will be working at the center in any capacity. List the education requirements, if any, of the staff.
    Identify the necessary licenses needed to open a daycare center.
    Describe the age range of the infants and/or toddlers that you will serve.
    Explain the child to teacher ratio that you will use in your center
    Describe the furniture and other materials needed.
    Identify what makes your childcare unique from all of the other childcare centers in your city
    Will you lease or own a location?
    What insurances are necessary to open a childcare center in your city?
    Are permits necessary?
    How will you secure funding for the childcare center?
    How do you plan to market your childcare center?
    How will you assure the infants and toddlers are safe while in your care?
    Identify the goals you would like to achieve with your childcare business process. Describe realistic and attainable goals.
    Does your state require specific training for your employees?
    Identify your hours of operation.
    This assignment should flow in logical order. Please be sure to address each item in the list in detail. Single word answers are not sufficient. Provide complete and detailed information. The format of this assignment is your decision. You can submit as a PowerPoint if you desire or you may create in a word document. Pictures are acceptable as part of your plan.
    This assignment requires a cover page and References page, each in APA format, but not an abstract as this is not an essay writing assignment. Please use the most current edition of APA Style.  Resources for APA formatting can be found here. https://apastyle.apa.org/
    The Grading Rubric for this assignment is listed below.  Please take time to the review the rubric and use it to help ensure that all the required elements are included in your assignment.
    Please do not hesitate to ask if you have any questions or need any assistance with this assignment.  I am happy to help.
    IMPORTANT NOTE:  All writing for this assignment must be original.  Content generated by Artificial Intelligence is not permitted and will be addressed via the Student Code of Conduct.
    Please see the Grading Rubric for additional information on how your assignment will be graded.
    CHFD212 A1: Childcare Center Business Plan Grading Rubric
    Due on Jun 2, 2024 11:55 PM
    Hide Rubrics
    Rubric Name: CHFD212 A1: Childcare Center Business Plan
    Print
    Criteria

  • “Exploring Infant and Toddler Development: A Review of a Primary Research Article”

    Hide Assignment Information
    Turnitin™
    This assignment will be submitted to Turnitin™.
    Instructions
    Research Article Review
    For this assignment you will review a single, scholarly PRIMARY Research article in the APUS Library and summarize what it says about any topic concerning infant and/or toddler development (physical, social, emotional and/or cognitive/language development).   This assignment must be a review of scholarly research, NOT commercial Psychology Today, Wikipedia or WebMD style publications or self-help or parent support organization material  Your article must be recent within the past 5-7 years.  If you do not know what a primary research article is please see the resources below.
    ___________________________________________________________________________________________________
    Resources for finding an appropriate article
    What is an academic journal? Please review the following resources.
    What is a PRIMARY Research Article (you must choose a PRIMARY Research Article for this assignment)
    View this Video: How to Find and Use Library Databases
    What is a Scholarly Article? 
    Is It Primary? How Do I Know?
    HELPFUL HINT:  Start early.  If you are unsure if you have found the correct type of article, you will have time to reach out to ask your instructor for guidance. The APUS Librarians are also very helpful and can work with you to find an appropriate article.  You can reach them through the Library Portal.   
    ___________________________________________________________________________________________________
    Reading and summarizing a primary research article can be a bit overwhelming.  The purpose of this assignment is to expose you to what research looks like as opposed to a general new article or information found on the internet.  Research is a very defined and detailed process and is how new information is learned on a topic.  The information is then reviewed by other researchers to ensure that the outcome of the research is accurate.  Do not worry if you do not understand the entire article.  There are some sections, particularly the statistical analysis section, that you may find difficult to follow.  This is okay.  You will still be able to successfully complete the assignment. 
    For this assignment, you will download, save and complete the Research Article Review form attached below for your assignment submission.
    Please use the most current edition of APA Style.  Resources for APA formatting can be found here. https://apastyle.apa.org/
    IMPORTANT NOTE:  All writing for this assignment must be original.  Content generated by Artificial Intelligence is not permitted and will be addressed via the Student Code of Conduct.
    Please see the Grading Rubric for information on how your work will be graded.
    CHFD212 A3: Scholarly Article Review (NOV 2022) Grading Rubric
    Due on Jun 30, 2024 11:55 PM
    Attachments
    Research Article Review Form.docx (14.82 KB)
    Download All Files

  • “From the Rural Town of Cancun to the Digital Age: An Interview with My Mother”

    We have to make an interview essay, i chose my mother who was born in cancun mexico, in the rural town, the target. what technology they were around when growing up . what their daily life in covid was and how affected them mentally.
    Was technology a negative or positive impact on their life and their thoughts of ai. 
    just the general questions on the paper of the questions. 
    times new roman

  • “Strengthening Information Security: An Analysis of the CA Family of Controls and Their Role in Protecting Organizations’ Information and Information Systems” Talking Points: 1. The CA family of security controls, as outlined in NIST SP

    For this week’s discussion you are asked to create a 3-5 paragraph “talking points” paper in which you discuss the (CA) family of security controls. You should identify and discuss at least three specific controls from this family. Focus on how these controls provide for implementation of assessment, authorization, and monitoring functions to protect the organization’s information and information systems. CA-5, for example, calls for developing a specific plan of action and milestones to track security controls implementation. CA-2 requires that all security controls be assessed to determine if they are working as intended.
    Your talking points will be incorporated into a budget presentation and, for that reason, should support (explain) the Office of Risk Management’s planned activities in this area for the next fiscal year. Full paragraphs are preferred for a talking points paper, but you may use a limited number of bullet points. Remember to use and cite authoritative sources in your work. Place your list of references at the end of your paper.
    Remember to submit your discussion response to the Turn It In for Discussions assignment folder. See the forum instructions for more information.
    For your critiques, focus on providing suggestions for strengthening the original poster’s analysis of the CA controls. Include at least 3 examples and/or content suggestions supported by your own readings (include citations and references for authoritative sources). For full credit, a total of two critiques and two additional responses or follow-up postings are required in addition to your main posting.
    In the discussion for this week, you and your peers will be analyzing the CA family of security controls. These controls provide for implementation of assessment, authorization, and monitoring functions to protect information and information systems. CA-5, for example, calls for developing a specific plan of action and milestones to track security controls implementation. CA-2 requires that security controls be assessed to determine if they are working as intended.
    Week 3 Readings: 
    Chapter 4 in the (ISC2) SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Ed. Available from the UMGC online library (UMGC student login required). https://go.oreilly.com/umgc/https://learning.oreilly.com/library/view/isc-2-sscp-systems/9781119854982/
    Review Section 3.4 Assessment, Authorization, and Monitoring in NIST SP 800-53 rev 5. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf

  • Exploring the Impact of FOGO NA ROUPA and Founder Carlos Aceituno on the AfroBrazilian Samba Community in San Francisco Title: FOGO NA ROUPA: Celebrating AfroBrazilian Samba in San Francisco

    Please research and respond to the work of SF based AfroBrazilian samba group “FOGO NA ROUPA” and specifically the bio, participation, and intentions of founder Carlos Aceituno. You can look through El Tecolote Archives for any stories about him and FOGO. 
    Descriptive Section: What is the community / neighborhood where the performance took place? What is the physical description of the site? The atmosphere? Can you tell the make-up of the intended audience or community that the performance connects with? 
    Analytical Section: What is the performer(s)’s skill level? Were you able to identify any narratives or discourse relating to themes? In your opinion, how successful was the performance in conveying its points to the community? Does the community (or others) respond in any way? How? Can you identify any central challenges and/or obstacles that the performer had to face? Can you identify key components and positive elements? 
    Critical Section: You must engage other course material: What aspects of the course work, discussions, and readings, including foundational readings and plays, can you relate to these performances? 
    Material:  Amalia Ortiz, Mayda del Valle, Pedro Pietri, Guillermo Gomez Peña
    Personal Connection Section: What is your personal relationship to the work these cultural venues do? What do you have in common with the work they do? What is new to you?  How were those perceptions changed, or not? What have you learned that you didn’t know before or expect?

  • Title: “The Importance of Due Diligence and Due Care in Risk Management: A Brown-Bag Lunch Training Presentation for the Office of Risk Management” Introduction: Welcome to this brown-bag lunch training on the two key principles of risk

    In the readings this week, two ethics related principles were discussed– due diligence and due care. Your readings also included the RA (Risk Assessment) family of security controls (from NIST SP 800-53).
    For this discussion, you are asked to construct a short handout (3-5 paragraphs — about one page if printed) which could be used to conduct a brown-bag lunch training presentation for individuals newly assigned to the  Office of Risk Management under the Director of IT Security Services. Your training materials will be strengthened by the use of authoritative sources and examples — this means you need to cite your sources and provide a list of references at the end of your handout (your posting).
    The handout and training should explain why due diligence and due care are important success factors for risk management efforts. You should specifically address the harm that could occur if the individuals performing risk assessment functions do not exercise both diligence and care. (e.g., efforts to identify and manage risk may not be sufficient to prevent or mitigate attacks or other adverse events which affect the security of information).
    Your handout should provide examples of potential harm from a lack of diligence or care in the implementation of three or more Risk Assessment (RA) family security controls. You might consider RA-1 (policy), RA-2 Security Categorization, and RA-9 Criticality Analysis. There are other relevant controls in this family which are worth discussing.
    Remember to submit your discussion response to the Turn It In for Discussions assignment folder. See the forum instructions for more information.
    For your critiques, focus on providing suggestions for strengthening the original poster’s analysis of the RA controls. Include at least 3 examples and/or content suggestions supported by your own readings (include citations and references for authoritative sources). For full credit, a total of two critiques and two additional responses or follow-up postings are required in addition to your main posting
    Readings:
    Chapter 3 in the (ISC2) SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Ed. Available from the UMGC online library (UMGC student login required). https://go.oreilly.com/umgc/https://learning.oreilly.com/library/view/isc-2-sscp-systems/9781119854982/
    Review Chapter 1 (Data Governance) & Appendix A (FAIR) in CIPM Certified Information Privacy Manager All-in-One Exam Guide.  https://learning.oreilly.com/library/view/cipm-certified-information/9781260474107/?ar
    Review Section 3.16 Risk Assessment in NIST SP 800-53 rev 5. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf

  • Artifacts and Theme Selection for Project Part One

    The artifacts and theme can be any of your choosing.
    Overview
    Your first step in developing Project Part One for the course is to identify the two artifacts you want to compare and the theme that is common to both artifacts. While you will analyze and compare these artifacts in Theme: Examining the Humanities, you want to make some initial observations. In this step, explain how you see the theme expressed in both of your artifacts. Then, reflect on how the theme itself is connected or relevant to you personally. For example, is this a theme you find particularly inspiring? Has this theme been particularly relevant to a past experience?
    Prompt
    Choose two cultural artifacts to analyze. These artifacts may take the form of any artistic medium, such as literature, poetry, music, film, dance, painting, and sculpture, and so on. However, it is important to choose two artifacts that have been created by different artists and were created during different time periods (ex. separated by at least 50 years). Then, identify an initial theme (or themes) that is common to both of your chosen artifacts. You will analyze these artifacts and their expression of the identified theme in Theme: Examining the Humanities and Theme: Impact of the Humanities.
    Specifically, the following critical elements must be addressed:
    Describe the cultural artifacts that you have chosen. Consider questions such as these in your response: What is the name or title of the artifact? Who is the author or artist? What is the date or time period when the artifact was created? What is the cultural location or physical setting of the artifact? In addition, you could consider including a photograph or image of each cultural artifact, if they are visual artifacts.
    Identify at least one common theme that will serve as the framework of your exploration document. How is the theme expressed in your artifacts?
    Reflect on how the theme you identified is related to your personal experience. For instance, you could discuss how the expression of the theme in your cultural artifacts is connected to you personally.
    What to Submit
    Your artifacts and theme selection should adhere to the following formatting requirements: 1 to 2 pages in length, double-spaced, using 12-point Times New Roman font and one-inch margins. You should use current APA style guidelines (or another format approved by your instructor) for any potential citations or references.
    Project Part One Artifacts and Theme Selection Rubric
    Criteria Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
    Cultural Artifacts Describes two selected cultural artifacts Describes selected cultural artifacts but with gaps in detail or clarity, or does not identify two artifacts Does not describe selected cultural artifacts 30
    Common Theme Identifies at least one common theme to serve as framework of exploration document and initially explains how theme is expressed in artifacts Identifies at least one common theme to serve as framework of exploration document and initially explains how theme is expressed in artifacts but with gaps in clarity or detail Does not identify common theme to serve as framework of exploration document 30
    Personal Experience Reflects on how identified theme is related to personal experience Reflects on how identified theme is related to personal experience but with gaps in clarity or detail Does not reflect on how identified theme is related to personal experience 30
    Articulation of Response Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 10
    Total: 100%

  • “Ethical Considerations in Information Sciences: An Integrative Review of Policies, Laws, and Professional Codes of Conduct”

    Your final paper will primarily function as an integrative literature review about a particular ethical issue or case related to information sciences. In addition to presenting and integrating scholarly research articles, your final paper should also describe and discuss any relevant policies or laws relevant to the issue.  You should also use ethical/philosophical ideas and professional codes of conduct to explicate the issue.
    It should include at least eight scholarly peer-reviewed sources.

  • The Utopian and Dystopian Implications of Thalia: A Sociotechnical Analysis of the Facial Recognition App

    The year is 2025. Big Tech companies and numerous startups have created apps that use facial
    recognition and analysis to track users’ “well-being.” Such apps are now standardly included on
    smartphones (e.g., Apple Health), and evidence shows that roughly 50% of all smartphone users use these
    apps. The most popular is an app called “Thalia” 
    Either on your own or with a partner, write a fictional newspaper op-ed (600-800 words) about Thalia.
    The op-ed should begin with the line: “It’s on your phone, it’s in the news. Thalia, an app that uses facial
    recognition and analysis to monitor users’ mental health, has taken the world by storm. But what does it
    mean for us and our society when AI tells us how happy we are?” 
    Writing for a general audience of readers, discuss the fictional app “Thalia,” arguing its sociotechnical
    benefits and detriments. Your opinion piece must take a clear stance: if you and your partner agree that
    Thalia is beneficial in some ways and detrimental in others, you can (of course) say this, but you should
    make a choice about which benefits/detriments outweigh the others. Such a choice should reflect whether
    Thalia is more utopian or dystopian. 
    Please cite and discuss the following four articles in your response to this assignment: 
    • Stark, L. (2019). Facial recognition is the plutonium of AI (Week 3 Reading) 
    • Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information
    civilization. (Week 4 Reading) 
    • Buchanan, R. (1992). Wicked problems in design thinking. (Week 4 reading) 
    • Seberger & Patil (2021). Post-COVID public health surveillance and privacy expectations in the
    United States (Week 6 Reading) 
    Format: 
    • Standard formatting requirements apply (See syllabus) 
    • Submissions should include a headline, a by-line (i.e., both authors names), and use language that
    is accessible to general readers (i.e., non-specialists) 
    • References to each of the four required articles (bulleted above) should be in APA format 
    • Submissions should be between 600 and 800 words (not including references and bibliography) 
    Grading Rubric: 
    • Formatting: 6pts (1pt per formatting requirement: headline, byline, accessible language,
    references to each of the four required articles, APA reference format, word count) 
    • Clear position about Thalia: 3pts (e.g., sociotechnically beneficial / utopian; sociotechnically
    detrimental / dystopian; both, but one outweighs the other) 
    • Demonstrate understanding and use of the four bullet-pointed articles above: 16pts
    o (4pts per discussion of each article)

  • Debate: Code of Ethics vs. Personnel Security Controls for Ensuring Ethical Behavior in Information Systems

    For this discussion, you are asked to consider whether ethical behavior can be assured using the Personnel Security (PS) family of controls (as specified in NIST SP 800-53). Or is a Code of Ethics a better tool for promoting ethical behavior with respect to the use of information and information systems within a specific organization?
    Write your response in the form of an opening statement for a debate. Pick one of the two positions below and construct a 3 to 5 paragraph argument for your position. Your argument will be strengthened by the use of authoritative sources and examples — this means you need to cite your sources and provide a list of references at the end of your posting.
    Position #1 — a Code of Ethics is the stronger method for ensuring ethical behavior.
    Position #2 — Implementation of Personnel Security Controls is the stronger method for ensuring employees act ethically.
    Remember to submit your discussion response to the Turn It In for Discussions assignment folder. See the forum instructions for more information.
    For your critiques, focus on providing suggestions for strengthening the original poster’s debate statement. Include at least three examples and/or content suggestions supported by your own readings (include citations and references for authoritative sources). For full credit, a total of two critiques and two additional responses or follow-up postings are required in addition to your main posting.
    This are the readings and i sent the file for the first one since it might not open, let me know if you do not have access to the other readings.
    Week 1 Readings:
    Chapters 1 & 2 in the (ISC2) SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Ed. Available from the UMGC online library (UMGC student login required). https://go.oreilly.com/umgc/https://learning.oreilly.com/library/view/isc-2-sscp-systems/9781119854982/
    Executive Summary and Chapter 2 in NIST SP 800-53 rev 5. Security and Privacy Controls for Information Systems and Organizations. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
    Review Section 3.14 Personnel Security in NIST SP 800-53 rev 5.
    Review (ISC)2 Code of Ethics https://www.isc2.org/Ethics