could you summarize the two articles

the articles that i need you to summarize are in these website

https://www.bbc.com/future/article/20190403-how-much-water-should-you-drink-a-day

https://www.medicalnewstoday.com/articles/153188.php

The article review template are uploaded.

a 750 word minimum essay on privacy in mass media in general privacy issues for media consumers and how mass media companies deal with privacy the whole essay is in relation to mass media news social media and consumers

A 750 word (minimum) essay on Privacy in mass media in general, privacy issues for media consumers, and how mass media companies deal with privacy. The whole essay is in relation to mass media, , News, Social Media and consumers.

these are the professors requirements please read them carefully.

The paper is 750 words at least, The topic you have to write about is Privacy in mass media, be sure to provide a list of hyperlinks to the specific articles, videos, etc., that you rely on as the basis of your essay. You can include these in a Works Cited page APA style.

In composing the essay, you should describe/define the issue and cite examples of how it is playing out in the public sphere. for example Social media apps.

You can discuss how journalists or news organizations or other parties are dealing with the challenges presented by the issue. You can point to the effects and implications of the issue.

You can address possible remedies or policies to deal with the issue. You can do any or all of those.

Most of all, I want you to present a well-organized essay that provides constructive comment on your topic of choice.

Your paper should define/describe an issue and give at least one significant example from Mass Media for example Websites, newspapers, blogs, social media

If you have any questions please ask i want to make sure the assignment is perfect.

thread 9 1 what are the policy tradeoffs among environmental protections profits and economic growth amp private property rights due march 8 2020

Discussion Board Q & A

DiscussionThread: 9.1 What are the policy tradeoffs among environmental protections, profits and economic growth & private property rights?

PSC-4400 International Organization (Due: March 8, 2020)

This is just a Discussion Board Q & A

This is the pic of book cover we are reading!See the source image

9.1 What are the policy tradeoffs among environmental protections, profits and economic growth & private property rights?

Collapse

Read Instructions down below!

The Parable of the Commons shows us that economic incentives can sometimes come in conflict with the long-term protection of the commons. Even though the users of the commons were acting rationally to increase the number of sheep grazing on the commons, they were in fact acting irresponsibly to do so. National governments and IGOs also face this dilemma when it comes to deciding environmental policy. How much use of the commons is enough and how much is too much?

So environmental policy impacts economic policy and individual property rights and vice versa. National and global governments must determine the right policy mix.

Students are asked to answer the following question: What are some of the essential policy trade-offs among environmental policy, economic policy, agriculture policy, and the private property rights of the citizens that governments must decide? Use course material, principles, and examples from Pease Chapter 8 to illustrate thee trade-offs.

ETextbook rented: If you cannot open up to the chapter here are the pages!

https://read.amazon.com/

Chapter 9 in hard cover book, are from pages 252 – 288

Wont allow me to upload anymore files once match with a tutor I will upload the rest!

Thanks

week 5 essay assistance

Write an APA formatted 900 word paper with Abstract that expands on a theme from one of the chapters.

See Attachment

critique post below just a paragraph j

Selecting & Implementing Security Controls

Introduction

To all members on the Red Clay Renovation Board of Directors and IT Governance Board, the following briefing will present some of the high interest items related to Security Controls and how they align with the needs of Red Clay Renovation Information Security program. The purpose of this briefing is to explain the definitions and needs for each specific Security Control identified along with sub-family controls related to their hierarchy.

Description of Control Classes

Security control classes define and shape the security planning for an organization. According to Swanson, M., Hash, J., & Bowen, P. (2006), security control classes are used in the planning of security systems. Management controls involve the management of information systems and risks in relation to these systems. Management controls are practices that are usually focused on at the management level. Operational controls involve security measures that are performed by human controls. Operational controls are in position to enhance the security of systems. Technical controls involve security measures that are performed by computer or technological controls. Technical controls can conduct various functions such as automated protection against unauthorized access, detection of violations, and assist in the security of data and applications (p. 25-26). These standard security controls are commonly recognized around the globe and form a foundation for sound security practices.

According to Scarfone, K., Jansen, W., & Tracy, M. (2008), management, operational, and technical controls are essential in creating a strong security environment. In relation to each other, a policy will fall under management control, but the requirements are executed by human or operational control and systems or technical controls (Scarfone, K., Jansen, W., & Tracy, M., 2008). As all three security controls are essential and must work in relation to each other, Red Clay Renovation must use the same principles in protecting the IT Infrastructure for the Wilmington, DE Offices (Headquarters). Through training, education, and acknowledgment, each user must abide by company policies in executing operational controls coming down from management controls and supplemented with technical controls. Scarfone, K., Jansen, W., & Tracy, M. (2008), further add that too many security controls may become a barrier. Therefore, there should be a proper mix of controls with the goal of balancing security, functionality, and usability. Finally, it is important to emplace multi-layered security such as protecting sensitive data on a server using network-based firewalls, host-based firewalls, OS patching, etc. This allows for coverage if one security layer fails, then the other security layers can compensate for the loss (Scarfone, K., Jansen, W., & Tracy, M., 2008).

Red Clay Renovations Selection of Family Controls and Sub-Family Controls

Based on the network configurations and the many facility locations, physically separated geographically, Red Clay Renovation requires employees to travel and telework. This section will focus on three separate control classes specific to the needs of Red Clay Renovation while identifying two sub-family controls for each control class selected. In it, we will begin by focusing our attention to Risk Assessment under Management Controls with Risk Assessment Policy and Procedures and Vulnerability Scanning for its sub-family controls. Then we will focus our attention to Access Controls under Technical Controls with Remote Access and Access Control for Mobile Devices. Finally, we will focus our attention on Awareness & Training under Operational Controls with Security Awareness Training and Role-Based Security Training for its sub-family controls. The following will provide a description of each family with sub-family controls most applicable to Red Clay Renovation operations based on NIST definitions and guidance.

According to National Institute of Standards and Technology (2013, April), Risk Assessment is a tailored approach of identifying risks to an organization based on its assets, personnel, associates, and the nation in relation to its information system(s). Under RA-1, Risk Assessment Policy and Procedures, these controls are designed to align with federal laws, directives, regulations, executive orders, policies, standards, and guidance. Under RA-5, Vulnerability Scanning is designed to identify vulnerabilities affecting a system, specify flaws/misconfigurations, format checklists, test procedures, measure vulnerability impacts, produce security control assessments, remediate vulnerabilities, and share information results to assists with other systems with similar vulnerabilites. Access Control is a broad term that encompasses the granting of digital access for personnel to data/information, based on their individual privileges. Under AC-17, Remote Access is the use of gaining access to an organizations information system(s) from outside of the local network via methods such as the Internet which can be accessed through mediums such as wireless, broadband, dial-up, etc. The use of Virtual Private Networks (VPNs) is a way to use encryption while increasing the surety of integrity and confidentiality of information. Under AC-19, Access Control for Mobile Devices provides guidelines for restrictions/implementation and configuration/connection requirements for mobile devices in the control of Red Clay Renovation. Under AC-19 (5), mobile devices must have the capability for full device/container encryption to protect confidentiality and integrity of information. Awareness & Training is fundamental which directly relates to human operations. Under AT-2, Security Awareness Training is designed for all system users to include managers, executives, and contractors. Training should be tailored to meet the needs of the organization and provide the basic knowledge for users to understand the need for information security, maintain appropriate level of security, and respond to incidents accordingly. Under AT-3, Role-Based Security Training is tailored specifically based on an employee’s roles and responsibilities. This type of training must be completed prior to an employee having granted access to information systems or executing duties. Based on the Role-Based Training, one can be tailored to have a myriad of subject to include management, operations, technical roles/safeguards, countermeasures, etc. (p. 164-195).

Summary

In summary, this briefing covered the different Security Controls along with sub-family controls that are essential in the basic building blocks for the sustainment and prosperity of Red Clay Renovation through practicing standard security procedures through the guidance of NIST publications. Specifically, this briefing began by covering Risk Assessment through establishing Risk Assessment Policy and Procedures and practicing regular Vulnerability Scanning. Next, this briefing covered Access Control through establishing encrypted procedures and preserving confidentiality and integrity using VPNs and Access Control for Mobile Devices using encrypted and acceptable practices according to policies and regulations. Finally, this briefing covered Awareness & Training through Security Awareness Training tailored for all users and Role-Based Training tailored based on each employees’ roles and responsibilities. Based on the makeup of Red Clay Renovation employee’s and how they conduct business as a whole, these specific Security Controls would fit in with the companies needs regarding Information Security. With the implementation of the Security Controls mentioned in this briefing, Red Clay Renovation will assuredly be better equipped to execute secure operations while fostering a culture that is conducive to security awareness.

quiz and one page report environmental safety

Please see attachments for QUIZ and One page Report PLUS the Template the report has to be in.

Welcome to Week 5.

Attached Files:

Welcome to Week 5.

Last week we studied environmental noise pollution, OSHA’s Hearing Conservation Program, and employee training strategies. This week we will be evaluating thermal stressors and learning about electrical safety strategies. We will also be continuing our consulting project with Acme Manufacturing Co.

annotated bibliography for a literature review

References will be provided. Write 8-10 sentences on each reference; Summarize, Asses (was the paper good in comparison to others and generally? etc) and Reflect (How is it good or how can it be used to write the literature review?)

Use APA format.

This is for a Public Health class. The topic and subtopic will be provided.

References provided are 6 references. You can use others in relation to the subtopic if they tie in with the subject but they must be peer-reviewed and have a DOI number.

engl 1301 profile essay about celebrity

Profile Essay Requirements

Directions: Write a profile essay about a celebrity of your choice. Think about why you find this person interesting; they’re kirky, hardworking, funny, unusual, and so on. Research what others have to say about this person to collect a variety of viewpoints and possibly to gain new insights. Paint a verbal portrait of this person that views him or her from a specific angle and that captures something essential-an idea, social cause, insight, or theme.

MLA and Length Requirements:

  • Must be written in MLA format (correct heading, title, Times New Roman, Size 12, Works Cited Page).
  • Must be at least three pages.
  • Include at least three different sources (may use more).
  • Must have a creative title

Profile Requirements:

A profile can stick to the basic facts (as in a biographical sketch) or to provide an intimate depiction of the subject. Profiles have some or all of these features:

  • A subject that allows you to explore an issue, idea, or theme that is interesting to you and your readers.
  • An interesting angle that captures a single dominant impression about the subject.
  • A description of the subject that allows readers to visualize and imagine it.
  • Anecdotes that reveal the character of the subject through actions and dialogue.
  • A main point, or central theme about the subject that goes beyond the surface and factual details to address larger questions.

direct mail appeal assignment

Using the donor audience you identified in the ‘Defining Donor Audiences’ discussion, draft a strategy and example direct appeal letter to raise funds for your selected nonprofit(The Art of Elysium).

In a word document, this assignment should include both parts.

  • Part I: Create a one-page direct mail letter that you would send to the identified donor audience to solicit contributions for your nonprofit. There is no required format for this portion of the assignment; rather use what you have learned about quality direct appeals to decide how you will put your appeal together. At minimum, your assignment should include some item that solicits the funds, along with a ‘call to action.’
  • Part II: Write a brief (no more than half a page) explanation of how you would distribute your appeal. When would you send it? How would you send it? Are there other tools that you would use to support the letter and its distribution?

Keep in Mind: this assignment should be original content created by you. While I understand there are many donor appeal examples online, please do not submit anything that is not your own original ideas and work. You may use existing appeal examples for inspiration, but do not provide a carbon-copy of another letter. Be creative and use the research you’ve gathered on your selected nonprofit to guide your work.

The non-profit art organization I selected is The Art of Elysium. https://www.theartofelysium.org/

You must read the class power point, there are many examples, and tips for writing a mail.

why are athletes considered to be role models and other entertainers are not

I first want to point out that this assignment is not an essay. It’s a class discussion. So you can write about anything so there’s no right or wrong answer. And it should be only a paragraph long.