week 2 discussion 2

This will assist you in examining your own development of ethical and moral responsibilities as they relate to your Final Paper and its topic.
Read these articles from Week 1:
From Globalism to Globalization: The Politics of Resistance
Globalization, Globalism, and Cosmopolitanism as an Educational Ideal
Transnationalism and Anti-globalism
Read these articles from Week 2:
Introduction to Global Issues
A Global Ethics for a Globalized World
Virtue Ethics and Modern Society
Classical Stoicism and the Birth of a Global Ethics: Cosmopolitan Duties in a World of Local Loyalties
Reflect: The change of our world from a local economy to a national economy to a global, international economy means that increasingly diverse populations will have to work together to achieve common goals. However, as the economy becomes increasingly global, local economies and people may suffer economic disadvantage or may find themselves marginalized from the rest of the world. Globalization creates ethical dilemmas for which we will need to find solutions.
Write: For this discussion, address the following prompts:
Explain the implications of globalization.
Identify at least two ethical issues that go along with the global societal topic you have chosen for your final essay.
Explain how globalization contributes to or affects these ethical dilemmas.
Propose solutions to these ethical dilemmas that are feasible financially, socially, and culturally.
Your initial post should be at least 250 words in length, which should include a thorough response to each prompt. You are required to provide in-text citations of applicable required reading materials and/or any other outside sources you use to support your claims. Provide full reference entries of all sources cited at the end of your response. Please use correct APA format when writing in-text citations (see In-Text Citation Helper (Links to an external site.)) and references (see Formatting Your References List (Links to an external site.)).
Respond to Peers: Review your classmates’ posts, and respond to at least two of your peers by Day 7. In each response, provide comments on your classmate’s topic idea and ask a question that prompts your classmate to think more critically about how to explore the research topic in more detail. Each participation post should be a minimum of 75 words.

Structural and behavioral organizational ethics

Choose two of these models to evaluate.  In a three to five page paper excluding title page and reference page(s) complete the following:
Analyze the components of two of these models and how they can be used to enhance ethics and business performance.
Describe how organizations can utilize the models to drive ethical decision-making, including how those organizations might integrate the model into their business ethics programs. 
For each of the two models you have chosen, find an organization that utilizes the model and illustrate how it has been applied within the organization.
In addition to the textbook, be sure to support your work with evidence from at least three scholarly sources; including the Ashford University Library, peer-reviewed journals, and industry reports. 
The written assignments must be formatted in accordance with APA style guidelines as outlined in the Ashford Writing Center.
Carefully review the Grading Rubric for the criteria that will be used to evaluate your assignment.

Mathematical test of hypothesis statements

 Call centers typically have high turnover. The director of human resources for a large bank has compiled data on about 70 former employees at one of the bank’s call centers in the Excel file  Call Center Data . In writing an article about call center working conditions, a reporter has claimed that the average tenure is no more than two years. Formulate and test a hypothesis using these data to determine if this claim can be disputed. Solution Tip: You need to write mathematical test of hypothesis statements and apply the test of hypothesis steps.6-12: 2.  Using the data in the Excel file  Home Market Value,develop a multiple linear regression model for estimating the market value as a function of both the age and size of the house. Find a 95% confidence interval for the mean market value for houses that are 30 years old and have 1,800 square feet and a 95% prediction interval for a house that is 30 years old with 1,800 square feet. ( pg 173 chapter 6for excel file )

Please be
sure your work is organized, legible, and your responses are
substantive. You need to submit all details of your work including excel
sheets used to arrive to the solution. It is not enough to attach your
excel sheet. You MUST provide interpretation of results and describe


..It must be a 4 to 5 sentence response… Thanks in Advance……..
Jails and Prisons
From my experience working in both settings there are numerous similarities and differences to be noted in terms of jails and prisons. Although the term jails and prison seem to be used or viewed as interchangeably many members of society, especially law enforcement personnel and Criminal Justice professional who can relate as well as distinguish between the two. As a jailor for approximately a year to obtain experience in the jail setting, it was definitely an experience, especially when encountering offenders that had been inebriated as well as high off of illicit drugs. Hence, as I worked as a correctional officer and training sergeant for Texas Department of Criminal Justice for ten years the experience was invaluable.
For those of you that are not familiar with the prison and jail system, I would like to note that prison facilities are operated by the state housing criminals for longer periods of time and for more serious offenses such as felonies. When it relates to jails the convicted offender will serve a shorter sentence and it is usually for misdemeanors, which I like to note there are fewer offenders housed in jails verses prison facilities. Hence, if an offender is sanctioned a sentence which encompasses 18 months or less he/she will typically be placed in the jail setting and if the offender is sanctioned to a prison sentences longer than 18 months he/she will typical be placed in a transfer facility or prison facility within Texas Department of Criminal Justice.
In a prison setting there are many amenities for offenders because they are housed for longer periods of time, in order to keep offender occupied it is vital that educational programs as well as various services are implemented. Prisons have recreational areas, a dining hall area, church facilities, and an education facility which includes classrooms and libraries. Prison offenders are expected to share housing areas (cells) with other inmate that often creates a hostile environment, especially during the summer months.
A prison is capable of handling far more prisoners than jails, and the prisoners are segregated on the basis of the types of crimes that they have been committed as well as their custody level. Prison facilities are secure based on minimum to maximum custody levels. 
A jail is like a rehabilitation center for individuals that are awaiting trial and have not been convicted as well as housing an offender that may have been sanctioned to 18 months or less.
Jails keep inmates productively occupied by providing positive opportunities for inmates to engage in. An example of a type of program that jails may offer is drug rehabilitation programs. These programs help inmates to get clean of drugs and alcohol abuse if the resources permit.
Jails operate work release programs, boot camps, and other specialized services. They try to address educational needs, substance abuse needs, and vocational needs while managing inmate behavior. It is recorded that inmates’ idleness contributes to management problems.

Organization behavior PowerPoint

Of course, you can still insert charts, graphs, videos, graphics and excerpts from outside sources (as long as you cite those sources!) I want to see your commentary and analysis, in your own words.
IMPORTANT: Copying the work of others and representing it as your own (ex. copy and paste off of the internet or your text, OR using someone else’s work and just changing a few words) is Plagiarism, a serious academic offense. I have enabled the Turnitin plagiarism checker for this assignment, to help you identify potential areas of plagiarism. Papers that are substantially plagiarized will NOT be accepted for grading.
Although the format is a Power Point, I want to emphasize that this is NOT like your typical Power Point, which is basically an outline for a live presentation. Your project must be substantially loaded with content. You can do this either on the slides themselves, or you can add voice-over to simulate a live presentation.
The first slide should be your Introduction slide, the next 10-15 slides should be informational slides, the last slide should be the reference slide.

Week 5 auditing

You have been hired as an auditor for a local university. The university is preparing to undergo an accreditation inspection to validate security controls are in place and adhered to and that data is protected from unauthorized access from both people internal and external to the organization.
As the auditor, you play a key role in ensuring regulations and compliances are met. As the organization prepares for its three-year accreditation, you are tasked with gathering the artifacts that will be used to build the accreditation package.
Your university has an IT staff consisting of the following personnel:
CIO – Overall in charge of network operations and cyber security.
Information Security Officer – Implements and manages cyber security policies.
System Analysts – Tasked with monitoring security features implemented on hosts (laptops, desktops) and server side security (NIPS, NIDS).
Auditors – Tasked with validating baseline compliance of systems in accordance with Security Technical Information Guide (STIG), NIST, and Federal, state and local policies, regulations and laws.
System Administrators – tasked with managing data and applications on servers.
Network Administrators – tasked with managing all switches, routers, firewalls, and sensors.
Desktop Administrators – Tasked with administering hardware and software to users and managing the day to day trouble calls for users.
Help Desk – Acts as the liaison between the customer and administrators through the use of a Ticket Management System (TMS).
To ensure separation of duties, all employees are designated in writing the roles and responsibilities for which they are responsible. Terminated employees are debriefed and physical and logical access controls are removed to prevent further access.
Users are defined as those individuals that don’t have any elevated privileges that can affect the configuration of a computer or networked device. All users, prior to gaining access to the network, must read and sign a user agreement outlining the rules and terms of use. These forms are reviewed annually by the ISO and stored digitally on the network for three years from the date of termination. The organization defines a time period for each type of account after which the information system terminates temporary and emergency accounts (14 days) and all inactive accounts (accounts that have not been accessed for 45 days) are suspended and after 90 days, removed from Active Directory.
Advanced users are those users who possess the rights and credentials to physically make a configuration change to a networked device or direct a configuration change through positional authority. All advanced users complete the same initial user agreement as standard users as well as a Non-Disclosure Agreement (NDA). There is no required training needed for standard and advanced users.
For automated account management, the university uses Active Directory (AD). When a user arrives, they submit a request to have an account created to the Help Desk. The Help Desk creates a ticket that includes the signed User Agreement and assigns the ticket to the System Administrators (SA’s). The SA’s create the account and assign the user access based on their role. Users are assigned Least Privilege when an account is created. Discretionary Access Control is created for departments within the university to allow users within the department to share information amongst defined users. These processes aren’t audited and Active Directory has become a massive database containing users that are no longer employed within the organization as well as files that were created by them. No negative impact has been observed by this. System Admins track when users login and log out so that security and software patches can be pushed to the users machine. This tracking mechanism also contributes to non-repudiation in the event of a cyber security incident. Additionally, if there is no activity on the user’s computer for two minutes, the machine is configured to log the user out. Failure to login correctly three times will result in the account being locked out and will require the user to visit the Help Desk in person to validate their credentials prior to the account being unlocked.
As the organization prepares for its three-year accreditation, you are tasked with gathering the artifacts and complete an assessment which will be used to build the accreditation package. The accreditation package that will be submitted is will be under the Risk Management Framework (RMF) and will be utilizing the controls found in NIST Publications 800-53 and 800-53A. The controls that are to be audited have been provided to you. We will start with addressing the Access Control Policy and Procedure (AC-1).
For this assignment, complete the following tasks within this worksheet.
Refer to the scenario above and NIST 800-53 and 53A for reference when completing the spreadsheet contained in this worksheet. Ensure that you answer based on the information provided to you based on the Assessment Objective listed in the control and the data provided to you in the scenario. For example;
Assessment Objective
Test / Interview
Compliant / Non-Compliant
The organization develops and formally documents access control policy; the organization access control policy addresses: purpose; scope; roles and responsibilities; management commitment; coordination among organizational entities; and compliance; the organization disseminates formal documented access control policy to elements within the organization having associated access control roles and responsibilities; the organization develops and formally documents access control procedures the organization access control procedures facilitate implementation of the access control policy and associated access controls; and the organization disseminates formal documented access control procedures to elements within the organization having associated access control roles and responsibilities.
Access control policy and procedures; other relevant documents or records.
Organizational personnel with access control responsibilities.
Compliant – organization documents access control policy and is implemented based on user role and organizational policies.
Assessment Objective
Compliant / Non-Compliant

LEG 100. BUS LAW I. Assgmt 2, WEEK 8

S. bank, announced trading
losses from investment decisions made by its Chief Investment Office (CIO) of
$5.8 billion. The Securities and Exchange Commission (SEC) was provided
falsified first quarter reports that concealed this massive loss.

Write a five to six (5-6) page paper in which you:

Discuss how
administrative agencies like the Securities and Exchange Commission (SEC) or
the Commodities Futures Trading Commission (CFTC) take action in order to be
effective in preventing high-risk gambles in securities / banking, a foundation
of the economy.

Determine the elements
of a valid contract, and discuss how consumers and banks each have a duty of
good faith and fair dealing in the banking relationship.

Compare and contrast the
differences between intentional and negligent tort actions

Discuss the tort action
of “Interference with Contractual Relations and Participating in a Breach of
Fiduciary duty” and, if the bank you’ve chosen were to behave as JP Morgan did,
would you be able to prevail in such a tort action.

With the advent of
mobile banking, discuss how banks have protected the software that allows for
online transaction to occur through automation.

Use at least three (3)
quality references. Note: Wikipedia and other Websites do not quality as
academic resources. 

Your assignment must
follow these formatting requirements:

Be typed, double spaced,
using Times New Roman font (size 12), with one-inch margins on all sides;
citations and references must follow APA or school-specific format. Check with
your professor for any additional instructions.

Include a cover page
containing the title of the assignment, the student’s name, the professor’s
name, the course title, and the date. The cover page and the reference page are
not included in the required assignment page length. 

The specific course learning
outcomes associated with this assignment are:

Describe the legal
environment of business, the sources of American law, and the basis of
authority for government to regulate business.

Describe the elements of
a contract and explain the basic provisions of contract law relative to offer,
acceptance, capacity, legality, fraud, third-party rights, performance, and
breach of contract.

Explain the components
of the Uniform Commercial Code (UCC) relative to sales and lease contracts and
the basic provisions of the UCC addressing sales / lease contracts, title,
risk, insurable interests, and the performance and breach of contracts.

Use technology and
information resources to research issues in business law.

Write clearly and
concisely about business law using proper writing mechanics.

Asking The Right Questions

Here are some questions that might be useful:
How can we do that (don’t ask “Why can’t we do that?”)?
How else can we do that? What else could we do?
Will you help me? What else could we do?
Who, what, why, where, when, and how much?
Who will do what and by when?
Would these types of questions be useful in doing an internal analysis? Why or why not?   Please write 300-400 words.  Please provide references and only use original work to avoid plagiarism.

Business 465 Strategic management

Keep in mind what you have learned about strategy to this point – and use the feedback provided by your instructor on previous cases as you analyze this one. Read the case, “Costco Wholesale Corporation in 2018” in the back of your text, pages C-134 through C-142. Based on your knowledge to this point, write a 3-4-page analysis of this case – use the conclusion section to help guide your thinking (i.e., How does Costco maintain high performance? How does Costco compete with online retailers like Amazon?). This assignment is an analysis, not a summary, thus you do not need to repeat all the details of the case in your writing. Rather, focus on: (1) a brief intro that summarizes the case, (2) 3-4 paragraphs of analysis of the case based on the concepts of strategic management you’ve learned in this course, and (3) a clear conclusion.
APA formatting is required. This includes a title page, an abstract, and a reference page in addition to your 3-4 pages of content.
Sources are required. For this assignment, this means you should be citing from your textbook and at least one other scholarly source.

Retail Omnichannel

Your paper should not exceed 3 (three) pages including visuals (graphs, tables, etc.)
Include citations in a reference section for each information source using APA style. Any source not indicated in the reference section opens you to charges of plagiarism.
Communication and Readability: The paper should have a logical flow, be easy to follow and avoid grammatical mistakes.
Charts, Tables and Figures: intersperse relevant charts, tables, figures in the report to illustrate the results. In addition, students should label and refer to the charts, tables and figures in the body of the report. Charts, Tables and Figures count towards the total number of pages (no more than 3 pages total).
Assignment Instructions:Use the following background information and instructions to write a short paper (no more than 3 double-spaced pages) on current retailing omnichannel strategies.
BackgroundExperts agree in that retailers -such as Sears and Toys R Us- are struggling by using the old-school models: “You come to us, and we sell you something”. Omnichannel presence is now essential to their survival.
Using the company Target, briefly indicate its name and provide a description. Conduct research and answer the following:1. What are the current customer expectations for omnichannel touchpoints in a retailing environment?2. What trends are you seeing from this retailer as they relate to customer experience (CX)?3. One of retail’s biggest missed opportunities is the importance of customer relationship management (CRM). How might this retailer realize the benefits of CRM? How could relationships be created/maintained?