1. What are the differences between Social Media, E-mail and Instant Messaging?
1. What are the differences between Social Media, E-mail and Instant Messaging? 2. List some of the Social Media Risks? 3. Provide three best practices for managing Social Media Records?
150 words agree or disagree Discuss utilitarianism and deontological ethics. Utilitarianism is
150 words agree or disagree Discuss utilitarianism and deontological ethics. Utilitarianism is one of the most powerful and persuasive approaches to normative ethics in the history of philosophy. Though not fully articulated until the 19th century, proto-utilitarian positions can be discerned throughout the history of ethical theory. Though there are many varieties of the view discussed, utilitarianism is generally held to be the view that the morally right action is the action that produces the most good. There are many ways to spell out this general claim. One thing to note is that the theory is a form of consequentialism: the right action is understood entirely in terms of consequences produced. What distinguishes utilitarianism from egoism has to do with the scope of the relevant consequences. On the utilitarian view one ought to maximize the overall good — that is, consider the good of others as well as one’s own good (The History of Utilitarianism, n.d.). Deontological (duty-based) ethics are concerned with what people do, not with the consequences of their actions. Do the right thing. Do it because it’s the right thing to do. Don’t do wrong things. Avoid them because they are wrong. Under this form of ethics you can’t justify an action by showing that it produced good consequences, which is why it’s sometimes called ‘non-Consequentialist’. The word ‘deontological’ comes from the Greek word deon, which means ‘duty’. Duty-based ethics are usually what people are talking about when they refer to ‘the principle of the thing’. Duty-based ethics teaches that some acts are right or wrong because of the sorts of things they are, and people have a duty to act accordingly, regardless of the good or bad consequences that may be produced (Duty-based ethics, n.d.). 2. Discuss the different categories of unethical police behavior and provide an example of each. How do these unethical actions impact the policing profession? There are many levels of behavior and acts committed by law enforcement both on duty and off that can be considered misconduct. These acts can be categorized as ranging from the minor errors in judgement, to the blatant intentional victimization of honest law abiding citizens as well as the Police Misconduct
250 words agree or disagree This week we are focusing on intelligence
250 words agree or disagree This week we are focusing on intelligence led policing, and the changes seen in this arena since 2001. I think focusing on local law enforcement measures will not be focusing as much on the core concepts of this course, so I’d like to discuss the issue in terms of federal and DoD terms. After the terror attacks of 9/11 it was determined that there was a need for improved intelligence sharing between local state and federal law enforcement agencies. Since analysis revealed that there had been vital intelligence squirreled away by various agencies in the interest of preserving a source or not knowing the value of the intelligence they possessed, it is reasonable to believe that a robust intelligence sharing system would be beneficial in thwarting future operations (DHS). Thus, we have arrived presently to 77 fusion centers scattered across the United States. These centers provide a brick and mortar locale for collaboration between local state and federal agencies allowing rapid sharing analysis and reporting of important intelligence. I found two interesting articles regarding fusion centers and their varying levels of successes and failures. The first brings up an interesting point about the effectiveness managing policies and standardizing procedures between the various fusion centers, as well as managing the different levels of accesses and authorizations that the sister agencies hold within a fusion center. With the multitude of queries and search results generated daily at these centers, it’s paramount that there is proper oversight and accountability (Waterman
250 words agree or disagree While I have mixed opinions about predictive
250 words agree or disagree While I have mixed opinions about predictive policing, I find it to be an incredibly fascinating topic. Personally, I think it can blur the lines of civil liberties protection and proactive policing. However, I think with the proper, no-kidding, honest-to-goodness checks and balances, the technologies available to law enforcement and intelligence agencies can indeed be a force multiplier and allow for effective prevention of criminal acts or terrorism. The concept of protective policing brings to mind a couple of things. First and foremost, that law enforcement agencies utilize data science to create algorithms that conduct trend analysis and/or heat maps to indicate areas of significant instances of criminal activity. For example, in my town, statistically more crime occurs in low-income areas and housing projects. Our police department uses criminal intelligence analysts to do everything from social media/open-source analysis to trend analysis to perform predictive policing. One benefit of watching social media is that over time, criminal tradecraft can be identified, such as drug deals, communications methods between persons of interest, and neighbors reporting activity (to name a few). Online databases and scripting tools allow data scientists to create algorithms to identify, display, and alert users to endlessly-customizable circumstances. For example, when a known subject (SUBJ) is mentioned or tagged on social media, or when he checks in at a certain location. Another example is forensic trend analysis. One downside of this approach is that it, by default, requires historic analysis. This, then, requires that before such analysis is performed, it requires the long-term collection of information on activities… which means that efficacy of “preventive” policing evolves from a baseline to more effectiveness over time as more collection and analysis is performed. What concerns me about this, as I touched on before, is the potential for abuse. One “lesson learned” from an overseas tour was that often, people with differences of any sort (whether it be from perceived/actual personal slights, racial differences, tribal conflicts, etc), often report derogatory information about their neighbors for some form of personal gain – satisfaction, monetary compensation, or some other motivation. This, then, results in that neighbor being arrested, interrogated, or detained for long periods of time simply because a neighbor had a proverbial axe to grind. This is an inherent flaw in proposed “red flag laws” which come from a good place of course, but in practice, humans are fallible, and implementing a system where such “poison pen attacks” don’t result in an innocent person’s civil liberties being infringed upon. Geospatial Predictive Analysis is an interesting new trend that I can get behind. There aren’t any civil liberties to be concerned about or trampled on, and can all be done remotely, albeit after-the-fact or at best, in near-real-time. Lawful intercept operations can help here as well. Incidents can be plotted on a heatmap, included in a .kml (google earth geographic mapping file format), and analyzed in various ways and correlated with various data to not only identify who was where and when, but also what electronic signatures were present at the time of the occurrence. These can be flagged or marked so that when these correlations once again align, police can be dispatched to a given location (say, an area with known drug activity or gang violence). These same tools can be used to identify indicators not necessarily associated with individuals, such as time, locations, and other factors that can be identified and then weighed to determine whether things such as poor lighting, income of a given neighborhood, time of day, etc., are able to be identified as pre-event indicators that police can then use to attempt to mitigate risk. This might include visiting a neighborhood and encouraging a populace to take mitigation methods such as locking or alarm devices, or lighting improvement. A less-involved approach may be as simple as increased patrols when or where indicators are present. Regards, Antun References: Beck, C.,
Question This is a topic on the industrial revolution all info in file
This is a topic on the industrial revolution all info in file
This tutor stole money from me here in HomeworkMarket.com/Tutor Miss Professor
This tutor stole money from me here in HomeworkMarket.com/Tutor Miss Professor. Did not follow simple instructions for my assignment and on top of that turn in late, these cause for me to fail. I ask for a refund and the tutor refuse to do so. HomeworkMarket.com/Tutor Miss Professor not to be trusted and need to be remove from this site. the sole purpose of this tutor is to take money from people.
Do you think the process for Presidential Disaster Declarations is effective, today?
Do you think the process for Presidential Disaster Declarations is effective, today? What would you change to make these declarations more effective?
Here are the exact instructions from the professor: For your final
Here are the exact instructions from the professor: For your final project, you will be contributing to a blog on the topic of postcolonial analysis in the 21st century. Initially, the term “postcolonial” was applied to literature originating in waves of independence from previously colonized regions of the world (1950s-1990s). Nonetheless, the effects of those colonial relationships are ongoing even today. This blog is dedicated to collecting examples of current texts (1990-2015) that could benefit from postcolonial analysis. These might be instances of film, television, advertising (i.e. branding), social media, music, video games, and physical spaces, as well as more traditional forms of literature. A blog (short for weblog) is a hybrid form of writing originally used by journalists, but more recently adopted by academics to “test-drive” some of their theories and experiences. It is a blend of personal reflection and analysis. Blogs act as digital portfolios that showcase work and mastery of concepts and participation in a community of practice. Because of their public nature, they can be shared as writing samples for future career steps as well. An ethnography is a study of people and cultures. So for this project, you will be focusing on the people of the 21st century world. As a multimodal form of social media, a blog incorporates elements of visual design, sound, video, and interactivity to invite audience participation and engagement. Think of it as an opportunity to display your acquired knowledge and push the ideas past the discussions of the literature. Blog Resources: •Ethnographic Blogging: http://openanthcoop.ning.com/forum/topics/ethnographic-blogging •Why I Blog: http://www.theatlantic.com/magazine/archive/2008/11/why-i-blog/307060/ Sample Blogs: •Hybridity in Postcolonial Literature: https://taniathossainsight.wordpress.com/2014/03/16/hybridity-in-postcolonial-literature/ •Postcolonial Digital Humanities: http://dhpoco.org/blog/ •A Brief History of Postcolonial Literature: http://blog.bookstellyouwhy.com/a-brief-history-of-postcolonial-literature-part-i •Andrew Simile Postcolonial Literature Blog: http://apsimile.blogspot.com Your Final Project submission must include three specific sections: Summary: Provide a summary of Postcolonial theory. What is it? What is it concerned with? How is it a tool for looking at the world today? Why is it important? Consider when and how it emerged as a school of thought and give concrete examples to anchor your explanations. The goal of this section is to demonstrate your command of the theory and reflect on its intended purpose. Reflection: Choose the Postcolonial theme that has most resonated with you this term. Discuss yourself and your experiences in relation to that theme. Be specific, taking your reflection beyond general observations. The goal of this section is to demonstrate in what ways the theories have been relevant to your life or have caused you to reflect on your experiences. Application: Locate two (2) 21st-century texts that you find promising for Postcolonial analysis, and perform a succinct analysis of each. What themes emerge, and what are the messages about those themes? How does the theory illuminate your experience of the text? The goal of this section is to take the theory beyond the texts to identify how the concepts apply to the world around us.
Question Write a report on ONE of the following topics:-Lightweight roofing systems reducing
Write a report on ONE of the following topics:-Lightweight roofing systems reducing energy heat transfer-Green garden” facade assemblies for residential flats-Modular construction methods-Structural retaining wall options in subfloor regions-Sound attenuating window systems for residential buildingsFor your chosen topic, research at least three product options available in the Australian marketplace. List the advantages and disadvantages of each system. Include a discussion of the likely cost of each product including installation. The intention is that you produce a practical assessment of potential technological improvements to the environmental performance of larger scaleresidential construction.The report must be divided into subsections and must be provided with a contents page at the beginning as well as page numbers. Referencing should conform with the Harvard system.All statistics/info must be Australian Statistics. Please refer to the attached for guidance on the marking criteria.
dont need to be formatted – just answer the questions from both scenarios!
Assume that you are a supply chain manager and that the information in the chart portrays some of the key performance indicators (KPIs) that you routinely monitor to assess the efficiency of your network. Scenario 1 Your deliveries to retail stores have not been on time lately, and neither have the departures of loaded trucks from your distribution centers. Load times are well within standards, but the trucks are just not getting on the road on time. Additionally, while you have plenty of space in the warehouse, much of the inventory has been sitting there for much longer than you anticipated and seems to be gathering dust on the shelves. Your vehicle fleet is reaching the end of its economic life span , and routine preventive maintenance is just barely staying ahead of repairs. What do you believe are the root causes for late deliveries? How would you adjust operations to improve this? How does the inventory situation in the warehouse contribute to the issue of late deliveries? Scenario 2 In this final scenario, it appears that the warehouse is routinely past inventory capacity, and product age and overall cycle time are increasing. Your vehicle fleet is just past its prime; however, it is holding together well due to a robust and thorough preventive-maintenance program. You are just barely meeting your delivery schedules, and trucks are often late when leaving the warehouse. It seems that, once they are at the warehouse, they wait for an excessive amount of time before being loaded and hitting the road again. What is the root cause behind the reduced number of on-time deliveries? How can a warehouse management system (WMS) affect the delivery performance of a supply chain?
Instructions from professor: You have been hired as the Director of Human
Instructions from professor: You have been hired as the Director of Human Resources for the University of the Incarnate Word. You have been charged with the task of creating a wellness plan for UIW faculty and staff. The wellness plan should be comprehensive covering all six dimensions with DOABLE ideas. You should consider what UIW already currently provides employees and how you can enhance it, as well as adding new ideas. It would be wise to do research to see what other school and businesses do and then mold it to fit UIW. Please work on this project throughout the semester and contact me if you have any questions. This project can be a written proposal 3-4 pages in length, 12-point font, double spaced, and Times New Roman font
Power Point Presentation For this assignment, you will build on your previous
Power Point Presentation For this assignment, you will build on your previous work in this course and at Residency to create a Power Point presentation, which you will then present to your cohort and instructor at Residency. Your instructor will grade this assignment based on your Power Point presentation at Residency. The Power Point presentation should include the following: 1.1: Research Topic. 1.2: Research Problem. 2.1: Research Problem Background. 3.1: Theoretical Foundations. 3.2: Contributions to Theory. 3.3: Theoretical Implications . 3.4: Practical Implications. 4.3 Ethical Considerations. 6. References. Be sure to review the Power Point Presentation Scoring Guide to ensure that you address all of the gradi
150 words agree or disagree One terrorist tactic, and its not limited
150 words agree or disagree One terrorist tactic, and its not limited to terrorists, but something that all factions utilize. That is knowing your enemy. Just like we use counter-intelligence to thwart the adversary before they can act, they too are utilizing intelligence operations to understand our, or whomever their target is, vulnerabilities (Hoffman, 2006). You could say this is step one of any terrorist plot, but it’s just as important as the end result. If we look at early war on terror tactics involving road side IEDs (improvised explosive devices), they were crude but effective until we learned and adapted. We learned about the types of threats we expected to encounter but even though we gained ground on terrorist forces they did not take it as a complete loss. The longer we are in a position of superiority the easier it is for us to be observed and tactics adapted. They adapted by making IEDs take the shape of discarded ammunition magazines or “forgotten equipment”. We are trained to not reveal privileged information lightly because we don’t know who may be observing and terrorist elements will observe when the opportunity presents itself. Information gathering does not require high tech equipment, simply the use of their five senses and enough patience to use our rules of engagement against us. They document our movement, prompting us to change routes; they learn our standard operating procedures to anticipate our reactions. We have to shred documents because dumpster diving is a reliable source of information for the dedicated. Social media is an important part of our lives, and it is a valuable source of information from the adversary (Makhutov
To complete this assignment, upload a Microsoft Word document (.doc or
To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/ This assignment must be YOUR OWN WORK! This is an individual assignment. We will check for Plagiarism, if any is detected in your work will result in a grade of zero for the entire paper. Attention your originality report should be at least 35% or lower to received a passing grade. Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded. You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) So in summary, here are the research paper requirements: 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment) Paper MUST address: How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures Cited sources must directly support your paper (i.e. not incidental references) At least 500 words in length (but NOT longer than 1000 words) Admin Notes: APA Paper Formatting guidelines 1.Title page 2.Abstract 3.Body 4.Text citation and references Additionally -As usual, the text is typed on standard white paper that has familiar parameters of 8.5″ x 11″. -The APA style requires using an easy to read font and recommends using a 12pt Times New Roman font. -Double spacing is required on both the title page and throughout the paper. -Margins should be 1″ concerning all sides of the page. -Paragraph indentation should be set to one half inch from the left side of the page. -The unique aspect is in creating a special page header that consists of the page number and the running head as typed on the title page in all capitals.
I need assistance for someone who knows about geology and can write
I need assistance for someone who knows about geology and can write a one page critique of a movie that can be possible and may not. I will drop a file.
150 words agree or disagree I found this week interesting in the
150 words agree or disagree I found this week interesting in the topic given since I have many thoughts as to where terrorist tactics are heading. First, i’m going to cover how the use of the internet played a key role and how it has evolved over time. The power of the internet is integral part of individual terrorism in that it serves as a mobilization tool (Michael, 2012). What does this mean? This means that terrorists utilize the internet to spread their beliefs, to recruit, and to fund terrorist operations from anywhere in the world. This mobile tool (a.k.a. internet) means contact from across the globe to others makes it easier, and additionally, overall less costly for terrorist groups. Instead of recruiting locally, terrorist groups can recruit via the internet from across the globe. Besides recruiting, terrorists are preaching to others their beliefs. Individuals across the world not associated with any specific group of religion have devoted themselves to certain terrorist organizations. Again, the use of the internet has made this possible. Lastly, spending less for recruitment and encouraging others to follow their religious beliefs means terrorist groups have more money for additional terrorist operation funding. Meaning, terrorists can use more of their funding for surveillance, planning, weapons, and funding other terrorist groups. I believe terrorist tactics are heading down a more advanced technological path. We have seen the use of cars, boats, and airplanes as a means of carrying devices of terror. Now devices have moved to the use of drones. Drones are utilized to carry explosives to targeted individuals. The use of drones make them hard to detect and the probability and successfulness of the attack are great, therefore there has been an increase in terrorists utilizing drones. Imagine not just one drone, but a swarm of drones carrying explosives to a target. The amount of damage caused by multiple drones would be devastating. Thinking more out of the box, how about a drone carrying a small portable nuclear device. I could not imagine this happening, but I will not say this is impossible. As we advance in technology and our methods of delivery, I can see only think these plans are in the works. References Michael, G. (2012). Leaderless Resistance: The New Face of Terrorism. Defence Studies, 12(2), 257–282. https://doi-org.ezproxy1.apus.edu/10.1080/14702436.2012.699724
In the twentieth century, contemporary medicine, traditionally considered a healing profession, evolved
In the twentieth century, contemporary medicine, traditionally considered a healing profession, evolved away from the role of Healing the sick to that of curing disease through modern science”… what is your opinion
Rely to these to questions? 1. I believe that we should
Rely to these to questions? 1. I believe that we should continue collecting data on race in nearly every situation. Data should be collected for census reports, and in studying differences in pay, opportunity, treatment by authority, as well as in intimate (such as marriage statistics) and aesthetic settings. This term, we have touched on all of the ways in which whites benefit from the domination of people of color. By collecting this data, we have proof that there is a racist aesthetic that sets out to depict people of color in a negative way (Desmond and Emirbayer, 2010, p. 364). We know that between 1998 and 2000, the average family income for blacks was $29,000 and $45,000 for whites (p. 157). We know that people of color are far less represented across nearly every form of media than white people. We know that modern segregation exists. Without data being collected, these are things we would not know—things that would continue to go unchanged for decades to come. We have also learned of the supposed “color-blind” badge of honor many tend to wear. Without such data being collected, people could argue that we are in a post-racist society. But because of the data collected on the above topics, we know otherwise. We know that racial equality is still something we need in our society—something to continue striving and fighting for—and collecting this sort of data helps in this fight. 2. The authors, Desmond
What Are Two Ways To Address This Problem
Consider an obstacle or barrier to the implementation of evidence-based practice you identified in last week’s discussion. What are two ways to address this problem?
Explain how a liberal and conservative would approach developing the US
Explain how a liberal and conservative would approach developing the US budget. Use evidence (cite sources) to support your response from assigned readings or online lessons, and at least one outside scholarly source.
Let’s suppose you have just started working in a long-term care facility,
Let’s suppose you have just started working in a long-term care facility, as a nurse, and you have a client who has been living there for several years. He/she does not want to participate in any activities, only comes out of their room for meals, walks a bit hunched over with a cane, is not well groomed, and does not seem to have made any true friendships with the other residents. This person can be male or female and seems to be angry most of the time when interacting with others. How would you go about establishing a rapport with this person? If the client accepts you, what questions would you ask him/her in order to identify the reasons for why they do not participate in activities and what did the client tell you? Depending on their answer, do you think they suffer from low self-esteem, disturbed body image, fears of some kind, anxiety, or hopelessness? Finally, list several interventions you would find in the care plan that could help this person to gain happiness in life and why they may be helpful.
The post 1. What are the differences between Social Media, E-mail and Instant Messaging? appeared first on Smashing Essays.
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"
