Archive for June 7th, 2022

Assignment # 3 for Philosophy Course

Short-Answer Questions make it brief

1. (1 pt.) Explain in your own words why you think you should exercise the “principle of charity” when interpreting the arguments of others? Relate it to your personal values. That is, how would exercising the “principle of charity” help you become a better person by your standards?

2. (1 pt.) Reconstruct the following argument using the techniques we learned in our textbook (translating non-statements into statements; including implicit premises; removing ambiguity; making precision out of vagueness) and place the argument in standard form (as presented on p. 79): 

“Its okay to lie to children about the existence of Santa Claus until theyre older, isnt it? So its okay not to tell my fiance that I used to be a man until after were married.”

3. (1 pt.) Reconstruct the following argument as in the previous question (NOTE: find the conclusion by asking yourself what the point of all this is; you can cut out quite a bit of fluff. That being said, there are sub-conclusions that will make the argument more complextry your best): 

“Recently I was knocked off my bicycle by a van coming out of a side road. I was concussed, despite wearing a cycle helmet, which was damaged by the impact of hitting the road. At the hospital, doctors suggested that, without the helmet, I could have died, or at least been in intensive care. And yet there seems to be considerable resistance in some cycling groups to any law requiring the wearing of helmets. Ministers have said it would be impossible to enforce such a law, but couldnt the same argument apply to seat belts? It is not difficult to see who is wearing a helmet. In Australia, it is illegal to ride a bike or for a child to use a scooter without a helmet. Cyclists have accepted this law. Are Australians more law-abiding than we are? Head injuries cost the NHS [the health care system] a considerable amount of money. I fail to see why helmets are required for motorbikes and not on bicycles, as the head injuries can be much the same. (Letter to the Daily Telegraph, 8 April 2011).

4. (1 pt.) Ask a question about A) the reading itself or B) how to apply the ideas from the reading to everyday life.

Long-Answer Prompt ( At Least 100 Words)

5. (2 pts.) Catch an argument made my someone else. This could be an argument made by someone you know in person or on social media or it could be an argument made by a public figure (politician, celebrity, or “social media influencer”)wherever. Try to capture what they said as accurately as possible and then answer the following question:

A) Was their argument an enthymeme? That is, were there implicit premises (assumptions) or even an implicit conclusion?

B) Was their argument a simple argument (one premise and one conclusion), a chain argument (with sub-conclusions), or a convergent argument (with many premises)?

C) [IMPORTANT] Reconstruct their argument by including missing propositions and putting in standard form as described in our textbook.

D) Do you think their argument was good now that you distilled it to its essence? Regardless, what could you do to make it stronger? Use the principle of charity as discussed in our textbook.

Deliverable 4 hypothesis test

Competency

Evaluate hypothesis tests for population parameters from one population.

Instructions

Scenario (information repeated for deliverable 01, 03, and 04)

A major client of your company is interested in the salary distributions of jobs in the state of Minnesota that range from $30,000 to $200,000 per year. As a Business Analyst, your boss asks you to research and analyze the salary distributions. You are given a spreadsheet that contains the following information:

  • A listing of the jobs by title
  • The salary (in dollars) for each job

Deliverable 4 – Hypothesis Tests.xlsx

In prior engagements, you have already explained to your client about the basic statistics and discussed the importance of constructing confidence intervals for the population mean. Your client says that he remembers a little bit about hypothesis testing, but he is a little fuzzy. He asks you to give him the full explanation of all steps in hypothesis testing and wants your conclusion about two claims concerning the average salary for all jobs in the state of Minnesota.

Background information on the Data

The data set in the spreadsheet consists of 364 records that you will be analyzing from the Bureau of Labor Statistics. The data set contains a listing of several jobs titles with yearly salaries ranging from approximately $30,000 to $200,000 for the state of Minnesota.

What to Submit

Your boss wants you to submit the spreadsheet with the completed calculations, answers, and analysis.

Deliverable 4 hypothesis test

Competency

Evaluate hypothesis tests for population parameters from one population.

Instructions

Scenario (information repeated for deliverable 01, 03, and 04)

A major client of your company is interested in the salary distributions of jobs in the state of Minnesota that range from $30,000 to $200,000 per year. As a Business Analyst, your boss asks you to research and analyze the salary distributions. You are given a spreadsheet that contains the following information:

  • A listing of the jobs by title
  • The salary (in dollars) for each job

Deliverable 4 – Hypothesis Tests.xlsx

In prior engagements, you have already explained to your client about the basic statistics and discussed the importance of constructing confidence intervals for the population mean. Your client says that he remembers a little bit about hypothesis testing, but he is a little fuzzy. He asks you to give him the full explanation of all steps in hypothesis testing and wants your conclusion about two claims concerning the average salary for all jobs in the state of Minnesota.

Background information on the Data

The data set in the spreadsheet consists of 364 records that you will be analyzing from the Bureau of Labor Statistics. The data set contains a listing of several jobs titles with yearly salaries ranging from approximately $30,000 to $200,000 for the state of Minnesota.

What to Submit

Your boss wants you to submit the spreadsheet with the completed calculations, answers, and analysis.

cp

Assume you are working with the accounting department in your organization to make a decision regarding a capital investment you feel is needed to improve productivity in your department.  The organization has limited resources and you are trying to prove why your department needs the resources more than other departments in the company. Provide an example of a possible capital investment to use in your argument to management that will be used throughout. Discuss what level of management would be involved in making capital investment decisions?  Describe the financial analysis tools you would use to convince management to make the investment you are proposing. Some non-financial factors included in capital investment decisions are more important now than they were 20-25 years ago. Give some examples of the types of non-financial factors that managers would consider in this decision that are more important in today’s capital investment decisions than they were in the past. 

Hiring Top Talent

prepare a PowerPoint presentation consisting of 5 slides not including the cover slide and the reference slide.

Every slide needs to include 100 words in the Notes section.

Discuss best practices for hiring top talent and the process for developing top talent from within the organization. 

Whose responsibility is it for developing employees? (Do not forget to answer this question.  It is critical that you do!!)

replay to a classmate

 

The World Health Organization (WHO) spearheads efforts internationally to work toward improved health on a global level. In providing toolkits, they offer strategies to facilitate healthcare practice change, and strive to give equal opportunity for people to experience a healthy life. The WHO recognized the impact that the geographic location of healthcare services has on patient outcomes. The physical location of healthcare resources directly affects how quickly patient needs are met. WHO-CHOICE uses Geographic Information Systems (GIS) to evaluate feasibility of reaching healthcare services (WHO, n.d.). They go further to involve national planning services, cost appraisal, and policy deliberation to investigate maximum benefits for health system establishment possibilities (WHO, n.d.). This toolbox is a free resource and looks at access to care from the perspective of the target population, the availability of coverage, and the accessibility of a specific type of service (WHO, n.d.). Toolkits such as these provide valuable information not only to patients, but also to practitioners, healthcare organizations, and those who formulate and implement policy.

     It is known that disparities in adolescent and young adult (AYA) cancer care have occurred on the basis of race, ethnicity, and socioeconomic status. Additional evidence has unveiled that AYA cancer patients living in more remote areas requiring travel time to seek healthcare services, have additional disadvantages leading to disparate outcomes. This patient population tends to have their disease diagnosed at more advanced stages and have a lower rate of survival (Darlington & Green, 2021). Supporting this concept, there is a proven increase in late-stage diagnoses for young cancer patients in rural settings as opposed to metropolitan areas (Darlington & Green, 2021). National Cancer Institute (NCI) designated Comprehensive Cancer Centers are able to provide the epitome of cancer with their ability to offer the latest technologies, well-trained oncology caregivers, and novel options such clinical trials (Sutton & Mayo, 2021). NCI cancer center locations however, tend to be skewed to the Eastern portion of the US requiring generous time commitments or temporary relocations on the part of patients. Also broadly speaking, remote sectors have decreased access to specialized care centers with cutting edge diagnostic tools (Darlington & Green, 2021). This may cause the diagnostic process to take longer, placing patients at a survival disadvantage in addition to compromising access to preventive care. With the WHOs AccessMod, this barrier can be readily identified. An advance practice nurse (APN) can more adeptly intervene and guide patients and families toward plausible options for care. Additionally, the APN can align with the WHOs actions in identifying rural areas with strong healthcare needs. With knowledge and resources provided by the WHO, the APN can become involved in supporting legislation and healthcare policy to help establish care services where they are sorely needed.

Assignment # 2 for Philosophy Course

Short-Answer Questions

1. (1 pt.) Which of the dispositions discussed in our reading do you think you already exemplify to some extent? What are some activities that you can do regularly in order to play to this character strength? Which of the dispositions do you think you lack? What are some activities that you could do to help foster such a disposition? 

2. (2 pts[Adapted from the “Exercise” on pp. 75-76] Watch scenes from the black-and-white movie Twelve Angry Men (1957)you can watch the whole movie or you can find a collection of scenes on YouTube (e.g., ). Select ONE scene that seems to exemplify one of the dispositions discussed in our reading (love of truth, open-mindedness, flexibility, modesty, self-knowledge, metacognition, or ONE of the so-called “dialogical dispositions”). Describe the scene and explain why you think it serves as a good example.

3. (1 pt.) Ask a question about A) the reading itself or B) how to apply the ideas from the reading to everyday life.

Long-Answer Prompt

4. (2 pts.) Select TWO of the guidelines for a constructive dialogue presented in our reading (pp. 74-75). Reach out to someone and try to engage in a live constructive dialogue (that is, not in a discussion forum) based on the two guidelines you selected. Report what you did to abide by the guidelines and how it went. Regardless of whether you successfully spoke with someone, what are ways that you personally could foster more constructive dialogues in your life moving forward? 

business report

Write a formal report on one of the following topics.
You should use at least 3 sources to research the topic and include the following sections:

Table of contents
Executive summary
Introduction
Findings
Summary of findings
Conclusions/Recommendations
Bibliography

Word limit 2000 words

The report must be correctly referenced, both with in-text citations and a reference list at
the end of your report.

You will be assessed on the following criteria:
 Content (appropriacy of subject, depth of research)
 Format
 Organization
 Language
 Effect on Target Reader

POST AND REPLY

 ****ANSWER EACH POST 250 WORDS MIN EACH POST****

1. DISCUSSION QUESTION- What are your views on the use of drones in our operations against terrorists?  Provide the short and long term costs and benefits of using drones against al Qaida targets.

2.  Discussion Questions: Beyond just its capability for mass means of communications and spreading fear, what are all the different ways that terrorist groups and violent extremist organizations are able to employ the internet? If you think about the terrorist attack cycle and the need to recruit, train, fund, resource, reconnoiter, plan, rehearse, and execute a terrorist attack which of these can be done in part or in whole on the internet? What are your thoughts on the internet and social media as it relates to impacts on extremism through networks and relationships as described by Archetti (2015) her alternative communication based framework to explain radicalization? 

****REPLY TO EACH POST 100 WORDS MIN EACH****

1.  While aerial reconnaissance during war has been leveraged since WWI, unmanned aerial systems (UAS) have afforded the United States (US) military and civilian population with numerous benefits. However, through continued use of this tool, the US has potentially become too reliant upon this capability, degrading overall combat effectiveness and global perception. This short forum post will outline the benefits and costs of this technology. 

Beginning with the benefits of US UAS, the number gain is reduction of risk to force. UAS afford combatant commanders a phenomenal tool in their toolbox to gain target fidelity. For the purposes of this forum the discussion will center around the United States Air Force (USAF) MQ1-B Predator. Armed with infrared sensor, color/monochrome daylight TV camera, image-intensified TV camera, laser designator and laser illuminator, the MQ1-B is a force multiplier. US military commanders can develop an Imagery Intelligence (IMINT) picture of a target location, and the collected intelligence can be layered with other intelligence disciplines. UASs offer military reach, ability to operate in previously denied, or untenable, areas. MQ-1Bs are armed with munitions, such as the Air-to-Ground (ATG) 114 Hellfire, offering the combatant commander an option for an operational end state. These UASs have been leveraged by the US military since 2004 and been utilized in several strikes to progress the US counterterrorism objectives. 

Collection bias, or satisficing, is the largest disadvantage to leveraging UASs. To further clarify, a UAS collection platform is only revealing one part of the actual ground truth. From an intelligence perspective, analysts can fall victim to collection bias, clouding the overall assessment of target importance, or contextually understanding what has been collected. This has led to several unfortunate civilian casualties when UAS airstrikes have been conducted.  The killing of civilians alone is terrible however, this completely counters the entire reason for the strike. By default, the local population is immediately pushed towards radicalization because of the inaccurate drone strike. This secondary effect of collection bias is the longest cost against leveraging UAS on the battlefield. 

2. Before we begin I suppose I should point out that my opinion is slightly biased considering I have been an MQ-9 Reaper aircrew member for a decade now and continue to work in the realm of Remotely Piloted Aircraft (RPA) or “drones”.

The biggest misnomer in the realm of RPAs is the terminology “drone” this gives way to the biggest misunderstanding that these aircraft are entirely autonomous and engage targets based on software parameters, which is entirely untrue. These aircraft are at all times controlled by US military personnel regardless of what level of autonomy the system is granted and never employ weapons without express permission by human authorities.

RPA use against terrorist targets however has been largely effective, their ability to provide a persistent overhead presence has been crucial to dealing with an insurgent adversary that does not utilize conventional tactics. Their precision guided munitions have limited collateral damage to an extreme degree and are some of the most precise weapons in the world. While we cannot say for sure what the battlespace would have looked like without their use, we can for sure say that they have had an incredible impact throughout the GWOT.

RPA’s come with a multitude of both cost and benefit that is inherent to their nature and current design and technological limitations. First, RPA’s excel at endurance, which is largely one of their greatest assets. With no requirement for life-support systems for aircrew members and no need to take in human factors considerations into their longevity on target, these assets can provide dozens of hours of ISR over hostile territory. The cost to this is that because they are unmanned, you lose a lot of situational awareness that a fighter aircraft might be able to gain during close air support (CAS) operations.

Another benefit is cost. The price of an MQ-9 system package is $56 million which includes four aircraft, equipped sensors, the ground control station (GCS) and a satellite antenna array. This compares to a fighter jet which alone can cost upwards of $100 million per jet. In addition to that, fuel costs are also entirely skewed as an MQ-9 can give 24+ hours on a fraction of what a fighter needs for 1+ hours of activity.

The largest cost is the one of the public eye and the extremely bad publicity the community has received from both the government and its civilian population. In all respects, an unmanned aircraft such as the MQ-9 is no different functionally than an F-16. They’re controlled by pilots, are fueled by JP-8, and are powered by electricity. Their weapons are largely the same and tactics are shared to the extent the airframe allows. RPAs however receive terrible press and are accused of striking civilian targets intentionally or otherwise at a larger degree than other aircraft and are accused of being more prone to incurring civilian casualties. Most of this is due to an information war that the US has wholly lost to al Qaeda which has served to gain them public sympathy

3.  The advancements in internet and digital information networks have had a very fundamental change in how terrorists use these mediums to expand their influences and gain larger audiences. Aside from communications and fear mongering, terrorist organizations use the internet and digital networks to target vulnerable populations and recruit members, finance their activities through illegal cybercrimes, spread their propaganda, and provide training through manuals and illustrations. This weeks assignment talked about the vastness and unregulated space the internet provides. This new frontier provides extremists with a great deal of anonymity and safe haven from authorities. The internet allows terrorists to operate in their own domain without outside interferences or prying eyes. According to the United Nations (2012), While the many benefits of the Internet are self-evident, it may also be used to facilitate communication within terrorist organizations and to transmit information on, as well as material support for, planned acts of terrorism, all of which require specific technical knowledge for the effective investigation of these offenses (p.1). 

Regarding the use of the internet as part of the terrorist attack cycle, terrorists can achieve much of it using the world wide web. Terrorists can easily recruit vulnerable people through the dissemination of propaganda and radical content. They can also use the internet to fund their campaigns by employing hackers to commit cybercrimes like phishing scams and ransomware attacks. The internet, private domains (intranets), and systems networks also allow for groups of terrorists and affiliates to talk in real-time using simple html-based chat groups or discussion forums. Multi-media presentations such as videos and images can be shared to develop possible targets, present surveillance findings, and conduct preliminary rehearsals, roles, and assignments that lead up to a physical attack. A terrorist attack doesnt have to be physical either, it can target critical infrastructure and come in the form of sophisticated malware.

I think Archetti accurately describes the impacts of social media and digital information platforms on extremism and radicalization. The current approach by many governments is to remove extremist content off the internet and monitor suspicious activity. But that concept is deeply flawed and misunderstood by our political leaders. Digital information networks are not made from a single pipeline where unwanted content can simply be shut off. The internet is made up of millions upon millions of interconnected private networks and systems, which are then interconnected with millions more pathways and routing systems that make it impossible to moderate and control. Therefore, the plan should not just be to remove, report, or moderate content but to also be pro active and create an environment in which vulnerable populations can understand the difference between real information and extremist misinformation. A place where religious scholars and civil leaders can have open discussions to help address concerns and put out the flames of hateful rhetoric and disassociate and shame extremist views and narratives. Or…they can disconnects everyone’s internet connection

4.  The internet and social media platforms allow a people in terrorist organizations the ability to reach out to people that were previously unreachable.  This is dangerous because anyone with a personal electronic device and a wifi connection can find or be susceptible to the information disseminated by these organizations. I think most of the terrorist attack cycle can be accomplished online and it would start with terror organizations flooding propaganda information through these online resources to reach and recruit those on the tittering point of extremist/radical behavior (Office of the Director of National Intelligence, n.d.). Funding can occur on the dark web with the use of cryptocurrency transactions through Litecoin and dash which remain largely unchallenged when it comes to illegal activities.  Training can be conducted with online tools like Youtube, or specific training videos for recruits which can be sent over the internet to specific people involved with the attack.  Reconnoiter and planning to find a soft target would be made easy through the use of the internet, however I think that in-person observations and surveillance of the target area is still needed to provide the best overall site picture for their attack.   Google could provide all the routes required, security measures, and any  other associated information related to their target of choice.  Rehearsal probably could be done online, but would be more effective if done in person in order to make sure everything is going according to planned, and obviously execution would need to be done in person, unless the attack is Cyber related like the malware attack on Colonial gas lines last year.   

Journal 1 and 2

Journal 1 

  1. What is your favorite new or emerging digital technology?
  2. List two uses for it.
  3. Do these uses represent continuity or change in the ways that people live, or some combination of the two? “Anchor” your response to a quote from one of this week’s readings.

http://www.newyorker.com/magazine/2007/05/14/what-else-is-new

Journal 2

  1. Does the constant presence of digital tech in the lives of families represent a disruptive change for families?
  2. What about family life has remained the same in the digital age?

each journal must be 225-300 words 

error: Content is protected !!