Archive for February, 2018

Suppose you were to develop an economic model of criminal activities

Suppose you were to develop an economic model of criminal activities

Suppose you were to develop an economic model of criminal activities, say, the hours spent in criminal activities (e.g., selling illegal drugs). What variables would you consider in developing such a model? See if your model matches the one developed by the Nobel laureate economist Gary Becker.Suppose you were to develop an economic model of criminal activities, say, the hours spent in criminal activities (e.g., selling illegal drugs). What variables would you consider in developing such a model? See if your model matches the one developed by the Nobel laureate economist Gary Becker.Suppose you were to develop an economic model of criminal activities, say, the hours spent in criminal activities (e.g., selling illegal drugs). What variables would you consider in developing such a model? See if your model matches the one developed by the Nobel laureate economist Gary Becker.Suppose you were to develop an economic model of criminal activities, say, the hours spent in criminal activities (e.g., selling illegal drugs). What variables would you consider in developing such a model? See if your model matches the one developed by the Nobel laureate economist Gary Becker.

MBA 6300 Case Study No.1 | Complete Solution

 

MBA 6300 Case Study No.1 | Complete Solution

There are numerous variables that are believed to be predictors of housing prices, including living area (square feet), number of bedrooms, number of bathrooms, and age. The information in the MBA 6300 Case Study.xlsx file pertains to a random sample of houses located in the greater Wilmington, Delaware area. 1. Develop a simple linear regression model to predict the price of a house based upon the living area (square feet) using a 95% level of confidence. a. Write the reqression equation b. Discuss the statistical significance of the model as a whole using the appropriate regression statistic at a 95% level of confidence. c. Discuss the statistical significance of the coefficient for the independent variable using the appropriate regression statistic at a 95% level of confidence. d. Interpret the coefficient for the independent variable. e. What percentage of the observed variation in housing prices is explained by the model? f. Predict the value of a house with 3,000 square feet of living area. 2. Develop a simple linear regression model to predict the price of a house based upon the number of bedrooms using a 95% level of confidence. a. Write the reqression equation b. Discuss the statistical significance of the model as a whole using the appropriate regression statistic at a 95% level of confidence. c. Discuss the statistical significance of the coefficient for the independent variable using the appropriate regression statistic at a 95% level of confidence. d. Interpret the coefficient for the independent variable. e. What percentage of the observed variation in housing prices is explained by the model? f. Predict the value of a house with 3 bedrooms. 3. Develop a simple linear regression model to predict the price of a house based upon the number of bathrooms using a 95% level of confidence. a. Write the reqression equation b. Discuss the statistical significance of the model as a whole using the appropriate regression statistic at a 95% level of confidence. c. Discuss the statistical significance of the coefficient for the independent variable using the appropriate regression statistic at a 95% level of confidence. d. Interpret the coefficient for the independent variable. e. What percentage of the observed variation in housing prices is explained by the model? f. Predict the value of a house with 2.5 bathrooms. https://wilmcoll.blackboard.com/bbcswebdav/pid-11105283-dt-c…11260.201810/MBA%206300%20Case%20Study%20No.%201.docx 9/8/17, 2L00 PM Page 1 of 2 4. Develop a simple linear regression model to predict the price of a house based upon its age using a 95% level of confidence. a. Write the reqression equation b. Discuss the statistical significance of the model as a whole using the appropriate regression statistic at a 95% level of confidence. c. Discuss the statistical significance of the coefficient for the independent variable using the appropriate regression statistic at a 95% level of confidence. d. Interpret the coefficient for the independent variable. e. What percentage of the observed variation in housing prices is explained by the model? f. Predict the value of a house that is 50 years old. 5. Compare the preceding four simple linear regression models to determine which model is the preferred model. Use the Significance F values, p-values for independent variable coefficients, R-squared or Adjusted R-squared values (as appropriate), and standard errors to explain your selection. 6. Calculate a 95% prediction interval estimate for the price of a 50 year old house with 3,000 square feet of living area, 3 bedrooms, and 2.5 bathrooms using your preferred regression model from part 5. Prepare a single Microsoft Excel file, using a separate worksheet for each regression model, to document your regression analyses. Prepare a single Microsoft Word document that outlines your responses for each portions of the case study. Upload your Excel and Word files for grading via the Blackboard submission link.

Women Participation in Leadership and Decision Making

 

Women Participation in Leadership and Decision Making

In patriarchic communities, women are perceived as the mediocre of the human species, and owing to this, they have been denied access the utilitarian and honored functions open to their male counterparts. For instance, leadership, management and decision making roles have been left exclusively for men. Even though such biased practices are extant in nearly all nations, their prevalence as well as cultural value norms and systems that lead to their perpetuation may not be brought out devoid of unreserved and total participation women and men in the process of development. Based on this, realization of balanced development demands the elimination of every form of prejudice against women.

Formal Use Policy for securing network

 

Formal Use Policy for securing network

Formal Use Policy for securing networks and databases You will create a formal acceptable Use Policy for an organization of your choice. You will use your textbook as a guide to provide detailed information security expectations of the employees in your organization.

The writing you submit must meet the following requirements:

·         Identify the main topic/question

·         Be at least two pages.

·         Cover all necessary points for security policy for the organization

Formal Use Policy for securing networks and databases You will create a formal acceptable Use Policy for an organization of your choice. You will use your textbook as a guide to provide detailed information security expectations of the employees in your organization.

The writing you submit must meet the following requirements:

·         Identify the main topic/question

·         Be at least two pages.

·         Cover all necessary points for security policy for the organization

 

Unit III Essay Comparative Essay Draft

 

Unit III Essay Comparative Essay Draft

Write a 750-1000 word essay about a pair of items in which the similarities and differences of those items are compared and contrasted in the style described within Unit III. Please note that the Comparative Essay Final will be due in Unit IV of this course. However, you should complete the entire paper in this draft and do your best work as you will have more applicable feedback from which to make changes to your essay for the final draft.

 

Purpose: Throughout Unit III, we have discussed the conventions of the comparative essay. The purpose of this assignment is to measure your mastery of those conventions by putting your knowledge into practice. In a larger context, the purpose of writing a comparative essay is to gain the skills of detecting similarities and differences between at least two items and then using those similarities and differences to create knowledge about either one or both of the items. In this way, the comparative essay is a tool used for both observation and analysis.

Process: For the comparative essay, you will complete the following steps:

1. Choose a pair of topics that complement one another: See the suggested list of topics in the “Comparative Essay Topics Handout” below in the supplemental documents portion of these instructions.

2. Create a list of similarities and differences: See Unit III, Lesson 2, for more instruction about how to create a list.

3. Create a thesis statement based on similarities, differences, or both similarities and differences: See Unit III, Lesson 3, for more information about how to create a thesis statement.

4. Choose whether to organize your essay by point or by subject: For an essay organized by point, see Unit III, Lesson 4, and the “Comparative Essay Example: Essay Organized by Point” below. For an essay organized by subject, see Unit III, Lesson 5, and the “Comparative Essay Example: Essay Organized by Subject” below.

5. Consult the “Comparative Essay: Final Self-Check List” below before submission.

 

Stylistic details: All essays must meet the following requirements:

 

 750-1000 words.

 Write in Times New Roman, 12 pt. font.

 Include one-inch margins on all sides.

 Use double spacing (top-to-bottom every page, to include above and below titles and centered words).

 Include an APA title page (for all essays) and reference list that includes all of the sources used in the essay.

 Include a header.

 Include page numbers (upper-right corner only).

 Adhere to APA convention and documentation style (See the CSU citation guide for assistance.).

 At least one source is required. All sources used must be cited.

CJA 345 Week 5 Research and Policy Development Paper

 

CJA 345 Week 5 Research and Policy Development Paper

Write a 1,400- to 1,750-word paper describing the importance of research as it relates to policy development within the field of criminal justice. Address each of the following:

 Identify the purposes and types of policies within the field of criminal justice.

 Describe the relationship between research and policy development.

 Provide examples of how research can assist policy makers by informing their policy decisions.

 Identify two examples of policies that were developed within the past 10 years that resulted from research within the field of criminal justice.

Include at least four peer-reviewed references.

Format your paper consistent with APA guidelines.

Submit your assignment of the Assignment Files tab.

Assignment 3: Outline a New IT Security Policy

Assignment 3: Outline a New IT Security Policy

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards.  RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues.  RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.

Your main objective is to create an outline of a new IT security policy regarding the company’s web presence and lack of access control. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five (3-5) page paper in which you:

  1. Briefly explain the current state of Web application security to the Board of Directors.
  2. Describe the major potential security risks associated with maintaining the organization’s Web presence, protecting its assets, and promoting e-Commerce.
  3. Assess any techniques and technologies that you may need to use to mitigate those potential security risks.
  4. Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.
  5. Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.
  6. Use at least four (4) quality references in this assignment. Note: Wikipediaand similar Websites do not qualify as quality references.
  7. Format your assignment according to the following formatting requirements:
    1. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    2. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    3. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:

8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.

The specific course learning outcomes associated with this assignment are:

  • Analyze the impact of the Internet and Web applications on the business world.
  • Analyze the evolution of social media, social networking, and the ethical issues they raise.
  • Compare and contrast Web-based risks.
  • Analyze common Website attacks, weaknesses, and security best practices.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills

 

CIS 560 Week 10 Term Paper: The Human Element

CIS 560 Week 10 Term Paper: The Human Element

Human nature is the single greatest vulnerability in any control system and cannot be ignored. Organizations should always take human behavior into account when designing access plans and strategies. Human beings can pose unintentional threats when they accidentally delete data. Hackers may be motivated by financial data when they attack a system or use social engineering skills to gain access to restricted data. Consider human nature and organizational behavior in this term paper.

Write an eight to ten (8-10) page paper in which you:

Propose five (5) techniques that organizations should apply to mitigate the threats arising from human nature.

Evaluate the consequences of a poor hiring decision. Propose steps that could be taken to prevent such bad decisions in the first place.

Examine what an organization could possibly learn when a policy is implemented to observe personnel in an ongoing manner.

Propose five (5) best practices that you would use to handle human nature and organizational behavior.

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Define proper security controls within the User Domain to mitigate risks and threats caused by human behavior.

Use technology and information resources to research issues in access control.

Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions

 

CIS 560:Security Access and Control Strategies: Access Restrictions

 

CIS 560:Security Access and Control Strategies: Access Restrictions

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment. 

Write a four to five (4-5) page paper in which you:

  1. Identify the business you have selected.
  2. Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access.
  3. Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access.
  4. Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access.
  5. Determine the type of access levels you would provide to a contractor or consultant.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Define authorization and access to an IT infrastructure based on an access control policy framework.
  • Use technology and information resources to research issues in access control.
  • Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions.

CIS 560 Week 9 Assignment 3: Secure Encrypted Communications

CIS 560 Week 9 Assignment 3: Secure Encrypted Communications

Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbers, online purchases, business orders, and so on must all be transmitted over secure communication channels. The Public Key Infrastructure (PKI) provides the most widely used secure communications technology. PKI relies on encryption.

Write a four to five (4-5) page paper in which you:

1.   Compare and contrast symmetric encryption to asymmetric encryption.

2.   PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate.

3.   Evaluate the advantages and disadvantages of using digital certificates.

4.   Evaluate the challenges related to public and private key management when using PKI.

5.   Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

§  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

§  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

error: Content is protected !!