managing an it infrastructure audit 8

Term Paper: Managing an IT Infrastructure Audit

This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan. You must submit all four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

  • They have a main office and 268 stores in the U.S.
  • They utilize a cloud computing environment for storage and applications.
  • Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
  • They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
  • They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
  • They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
  • They enable wireless access at the main office and the stores.
  • They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.

Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:

1. Develop an Internal IT Audit Policy, which includes at a minimum:

a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: Management Plan
Write a four to six (4-6) page paper in which you:

2. Explain the management plan for conducting IT audits, including:

a. Risk management
b. System Software and Applications
c. Wireless Networking
d. Cloud Computing
e. Virtualization
f. Cybersecurity and Privacy
g. BCP and DRP
h. Network Security
i. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 3: Project Plan
Use Microsoft Project or an Open Source alternative, such as Open Project to:

3. Develop a project plan which includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for the audit to be a two (2) week audit.

a. Risk management
b. System software and applications
c. Wireless networking
d. Cloud computing
e. Virtualization
f. Cybersecurity and privacy
g. Network security

Section 4: Disaster Recovery Plan
Write a five to seven (5-7) page paper in which you:

4. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

a. The organization must have no data loss.
b. The organization must have immediate access to organizational data in the event of a disaster.
c. The organization must have critical systems operational within 48 hours.
d. Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.
e. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the Sarbanes-Oxley (SOX) act and Committee of Sponsoring Organizations (COSO) framework.
  • Describe the process of performing effective information technology audits and general controls.
  • Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.
  • Explain the role of cybersecurity privacy controls in the review of system processes.
  • Discuss and develop strategies that detect and prevent fraudulent business practices.
  • Describe and create an information technology disaster recovery plan.
  • Develop an audit plan and control framework that addresses and solves a proposed business problem.
  • Use technology and information resources to research issues in information technology audit and control.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 210

Term Paper: Managing an IT Infrastructure Audit

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

Section 1: Internal IT Audit Policy

1a. Develop an overview for your Internal IT Audit Policy.

Weight: 3%

Did not submit or incompletely developed an overview for your Internal IT Audit Policy.

Partially developed an overview for your Internal IT Audit Policy.

Satisfactorily developed an overview for your Internal IT Audit Policy.

Thoroughly developed an overview for your Internal IT Audit Policy.

1b. Develop a scope for your Internal IT Audit Policy.

Weight: 3%

Did not submit or incompletely developed a scope for your Internal IT Audit Policy.

Partially developed a scope for your Internal IT Audit Policy.

Satisfactorily developed a scope for your Internal IT Audit Policy.

Thoroughly developed a scope for your Internal IT Audit Policy.

1c. Develop goals and objectives for your Internal IT Audit Policy.

Weight: 3%

Did not submit or incompletely developed goals and objectives for your Internal IT Audit Policy.

Partially developed goals and objectives for your Internal IT Audit Policy.

Satisfactorily developed goals and objectives for your Internal IT Audit Policy.

Thoroughly developed goals and objectives for your Internal IT Audit Policy.

1d. Develop compliance with applicable laws and regulations for your Internal IT Audit Policy.

Weight: 3%

Did not submit or incompletely developed compliance with applicable laws and regulations for your Internal IT Audit Policy.

Partially developed compliance with applicable laws and regulations for your Internal IT Audit Policy.

Satisfactorily developed compliance with applicable laws and regulations for your Internal IT Audit Policy.

Thoroughly developed compliance with applicable laws and regulations for your Internal IT Audit Policy.

1e. Develop management oversight and responsibility for your Internal IT Audit Policy.

Weight: 3%

Did not submit or incompletely developed management oversight and responsibility for your Internal IT Audit Policy.

Partially developed management oversight and responsibility for your Internal IT Audit Policy.

Satisfactorily developed management oversight and responsibility for your Internal IT Audit Policy.

Thoroughly developed management oversight and responsibility for your Internal IT Audit Policy.

1f. Develop areas covered in the IT audits for your Internal IT Audit Policy.

Weight: 3%

Did not submit or incompletely developed areas covered in the IT audits for your Internal IT Audit Policy.

Partially developed areas covered in the IT audits for your Internal IT Audit Policy.

Satisfactorily developed areas covered in the IT audits for your Internal IT Audit Policy.

Thoroughly developed areas covered in the IT audits for your Internal IT Audit Policy.

1g. Develop the frequency of the audits for your Internal IT Audit Policy.

Weight: 3%

Did not submit or incompletely developed the frequency of the audits for your Internal IT Audit Policy.

Partially developed the frequency of the audits for your Internal IT Audit Policy.

Satisfactorily developed the frequency of the audits for your Internal IT Audit Policy.

Thoroughly developed the frequency of the audits for your Internal IT Audit Policy.

1h. 2 references

Weight: 1%

No references provided

Does not meet the required number of references; some or all references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

1i. Clarity, writing mechanics, and formatting requirements

Weight: 1%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present

Section 2: Management Plan

2a. Explain risk management in the management plan for conducting IT audits.
Weight: 3%

Did not submit or incompletely explained risk management in the management plan for conducting IT audits.

Partially explained risk management in the management plan for conducting IT audits.

Satisfactorily explained risk management in the management plan for conducting IT audits.

Thoroughly explained risk management in the management plan for conducting IT audits.

2b. Explain system software and applications in the management plan for conducting IT audits.

Weight: 3%

Did not submit or incompletely explained system software and applications in the management plan for conducting IT audits.

Partially explained system software and applications in the management plan for conducting IT audits.

Satisfactorily explained system software and applications in the management plan for conducting IT audits.

Thoroughly explained system software and applications in the management plan for conducting IT audits.

2c. Explain wireless networking in the management plan for conducting IT audits.

Weight: 3%

Did not submit or incompletely explained wireless networking in the management plan for conducting IT audits.

Partially explained wireless networking in the management plan for conducting IT audits.

Satisfactorily explained wireless networking in the management plan for conducting IT audits.

Thoroughly explained wireless networking in the management plan for conducting IT audits.

2d. Explain cloud computing in the management plan for conducting IT audits.

Weight: 3%

Did not submit or incompletely explained cloud computing in the management plan for conducting IT audits.

Partially explained cloud computing in the management plan for conducting IT audits.

Satisfactorily explained cloud computing in the management plan for conducting IT audits.

Thoroughly explained cloud computing in the management plan for conducting IT audits.

2e. Explain virtualization in the management plan for conducting IT audits.

Weight: 3%

Did not submit or incompletely explained virtualization in the management plan for conducting IT audits.

Partially explained virtualization in the management plan for conducting IT audits.

Satisfactorily explained virtualization in the management plan for conducting IT audits.

Thoroughly explained virtualization in the management plan for conducting IT audits.

2f. Explain cybersecurity and privacy in the management plan for conducting IT audits.

Weight: 3%

Did not submit or incompletely explained cybersecurity and privacy in the management plan for conducting IT audits.

Partially explained cybersecurity and privacy in the management plan for conducting IT audits.

Satisfactorily explained cybersecurity and privacy in the management plan for conducting IT audits.

Thoroughly explained cybersecurity and privacy in the management plan for conducting IT audits.

2g. Explain BCP and DRP in the management plan for conducting IT audits.

Weight: 3%

Did not submit or incompletely explained BCP and DRP in the management plan for conducting IT audits.

Partially explained BCP and DRP in the management plan for conducting IT audits.

Satisfactorily explained BCP and DRP in the management plan for conducting IT audits.

Thoroughly explained BCP and DRP in the management plan for conducting IT audits.

2h. Explain network security in the management plan for conducting IT audits.

Weight: 3%

Did not submit or incompletely explained network security in the management plan for conducting IT audits.

Partially explained network security in the management plan for conducting IT audits.

Satisfactorily explained network security in the management plan for conducting IT audits.

Thoroughly explained network security in the management plan for conducting IT audits.

2i. 3 references

Weight: 1%

No references provided

Does not meet the required number of references; some or all references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

2j. Clarity, writing mechanics, and formatting requirements

Weight: 1%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present

Section 3: Project Plan

3a. Develop a project plan which includes the applicable tasks for risk management for each element of the audit mentioned above Using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Weight: 3%

Did not submit or incompletely developed a project plan which includes the applicable tasks for risk management for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Partially developed a project plan which includes the applicable tasks for risk management for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Satisfactorily developed a project plan which includes the applicable tasks for risk management for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two-week audit.

Thoroughly developed a project plan which includes the applicable tasks for risk management for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

3b. Develop a project plan which includes the applicable tasks for system software and applications for each element of the audit mentioned above Using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Weight: 3%

Did not submit or incompletely developed a project plan which includes the applicable tasks for system software and applications for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Partially developed a project plan which includes the applicable tasks for system software and applications for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Satisfactorily developed a project plan which includes the applicable tasks for system software and applications for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Thoroughly developed a project plan which includes the applicable tasks for system software and applications for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

3c. Develop a project plan which includes the applicable tasks for wireless networking for each element of the audit mentioned above Using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Weight: 3%

Did not submit or incompletely developed a project plan which includes the applicable tasks for wireless networking for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Partially developed a project plan which includes the applicable tasks for wireless networking for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Satisfactorily developed a project plan which includes the applicable tasks for wireless networking for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Thoroughly developed a project plan which includes the applicable tasks for wireless networking for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

3d. Develop a project plan which includes the applicable tasks for cloud computing for each element of the audit mentioned above Using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Weight: 3%

Did not submit or incompletely developed a project plan which includes the applicable tasks for cloud computing for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Partially developed a project plan which includes the applicable tasks for cloud computing for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Satisfactorily developed a project plan which includes the applicable tasks for cloud computing for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Thoroughly developed a project plan which includes the applicable tasks for cloud computing for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

3e. Develop a project plan which includes the applicable tasks for virtualization for each element of the audit mentioned above Using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Weight: 3%

Did not submit or incompletely developed a project plan which includes the applicable tasks for virtualization for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Partially developed a project plan which includes the applicable tasks for virtualization for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Satisfactorily developed a project plan which includes the applicable tasks for virtualization for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Thoroughly developed a project plan which includes the applicable tasks for virtualization for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

3f. Develop a project plan which includes the applicable tasks for cybersecurity and privacy for each element of the audit mentioned above Using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Weight: 3%

Did not submit or incompletely developed a project plan which includes the applicable tasks for cybersecurity and privacy for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Partially developed a project plan which includes the applicable tasks for cybersecurity and privacy for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Satisfactorily developed a project plan which includes the applicable tasks for cybersecurity and privacy for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Thoroughly developed a project plan which includes the applicable tasks for cybersecurity and privacy for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

3g. Develop a project plan which includes the applicable tasks for network security for each element of the audit mentioned above Using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Weight: 3%

Did not submit or incompletely developed a project plan which includes the applicable tasks for network security for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Partially developed a project plan which includes the applicable tasks for network security for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Satisfactorily developed a project plan which includes the applicable tasks for network security for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Thoroughly developed a project plan which includes the applicable tasks for network security for each element of the audit mentioned above using Microsoft Project or an Open Source alternative, such as Open Project, and planning for the audit to be a two (2) week audit.

Section 4: Disaster Recovery Plan

4a. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have no data loss.

Weight: 7%

Did not submit or incompletely developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have no data loss.

Partially developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have no data loss.

Satisfactorily developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have no data loss.

Thoroughly developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have no data loss.

4b. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have immediate access to organizational data in the event of a disaster.

Weight: 7%

Did not submit or incompletely developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have immediate access to organizational data in the event of a disaster.

Partially developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have immediate access to organizational data in the event of a disaster.

Satisfactorily developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have immediate access to organizational data in the event of a disaster.

Thoroughly developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have immediate access to organizational data in the event of a disaster.

4c. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have critical systems operational within 48 hours.

Weight: 7%

Did not submit or incompletely developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have critical systems operational within 48 hours.

Partially developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have critical systems operational within 48 hours.

Satisfactorily developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have critical systems operational within 48 hours.

Thoroughly developed a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization, wherein the organization must have critical systems operational within 48 hours.

4d. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization; include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.

Weight: 7%

Did not submit or incompletely developed a disaster recovery plan (DRP) fo

the rights of citizens 2

It is important to understand your responsibilities as a criminal justice professional when engaging with citizens. This assignment is broken into three (3) parts and you must complete each part of the assignment. Each part includes a text or video scenario to which you will respond by writing a one to two (1-2) page paper for each scenario that examines specific information regarding the events using your knowledge of the Constitution.

Part I: Law Enforcement Officer Arrives at the Scene Scenario

Read the text scenario below:

An eighteen-year-old high school student walks to class carrying a backpack. He is stopped by the school security guard and his backpack is searched. A loaded handgun is discovered. The school security guard takes the student to the principal’s office. The principal calls the local police. In the state where the school is located, it is illegal to carry a concealed weapon without a permit and all weapons are prohibited on campus.

Officer Smith arrives at the school approximately 10 minutes later. Officer Smith takes a statement from the school security guard and searches the student’s backpack. He seizes the gun and places the student under arrest. Officer Smith then asks the student if he would like to make a statement to explain why he was carrying a concealed weapon on campus.

The student replies, “What weapon? That’s not my backpack and I never saw that gun before.”

The student is then transported to the local jail. However, on the way to the local jail, Officer Smith asks the student again why he brought a loaded gun on campus. The student admits that it was his gun and stated that he needed it for protection. Upon arrival at the local jail, the student is booked. Six hours later, the student is interviewed by a Detective Columbo. The detective reads the student his Miranda warning and asks the student if he would like to make a statement.

The student replies, “No, I want a lawyer.”

Write a one to two (1-2) page paper in which you:

  1. Examine the Constitutional Amendment(s) that would relate to this situation.
  2. Outline the appropriate procedures you would need to follow to comply with the associated Amendments to ensure admissibility of evidence.
  3. Evaluate the officer’s actions and determine whether his search, the student’s confession, and the weapon discovery were lawful and/or admissible. Provide a rationale for your opinion.
  4. Use at least two (2) quality references. Consider using the Cornell Law website located at https://www.law.cornell.edu/constitution/index.html. You are also encouraged to use the Strayer University Online library (https://research.strayer.edu) to locate academic resources. Note: Wikipedia and similar websites do not qualify as academic resources.

Part II: Arrest and Trial Scenario

Read the text scenario below:

Tyler, a well-known escort service provider in his community, is suspected of the murder of an escort who worked for him. The local police met Tyler at the airport when he arrived from a trip to Cancun. He is arrested for his suspected connection to the murder of the escort. The police do not inform Tyler of his right to remain silent or his right to counsel. They immediately begin to interrogate him. They continue to question him until he admits that he knew the prostitute and that she worked for him. He also admits that he was with her the night of the alleged murder. Tyler is transported to the local jail and booked. The prosecutor files charges of First Degree Murder against Tyler. Tyler does not waive his rights to a speedy trial. He asks that an attorney be appointed and demands a trial by jury.

Write a one to two (1-2) page paper in which you:

  1. Examine the Constitutional Amendment(s) that would relate to this situation.
  2. Identify and discuss four (4) elements of arrest.
  3. Identify and discuss the Constitutional Amendments that would relate to this situation.
  4. Describe the appropriate procedures to comply with Tyler’s rights to due process.
  5. Examine any potential consequences that might occur if his right to due process is violated.
  6. Use at least two (2) quality references. Note: Wikipedia and similar websites do not qualify as academic resources.

Part III: Correctional Officers and Rights of Inmates

Hudson v. McMillian is a U.S. Supreme court case involving the excessive force resulting in a claim of cruel and unusual punishment under the Eighth Amendment. The court’s decision resulted in the five-pronged Hudson test, also known as PANAM:

  • (P)erceived threat by correctional officers;
  • (A)ny and all efforts to deescalate;
  • (N)eed for the application of force;
  • (A)mount of force that was used and;
  • (M)edical issues, and extent of any injuries, that are used to evaluate cases involving any use of force before trial and after conviction.

The test helps the courts determine whether correctional officers’ actions were reasonable, necessary, and conducted in good faith (as opposed to malicious, unreasonable, and unnecessary).

Watch the video scenario and take notes as you watch: CJ in Practice Constitutional Issue: Depravation of Inmates’ Rights

Write a one to two (1-2) page report in which you:

  1. Summarize the events of this scenario and the persons involved.
  2. Examine the Constitutional Amendments that would relate to this situation and whether the rights of the inmates in this scenario were violated. Support your opinion.
  3. Determine whether the incidents pass the five-pronged Hudson test discussed above.
  4. Recommend how the Sergeant should respond to the behavior of the officer(s). Support your response.
  5. Use at least two (2) quality references. You are encouraged to use the Strayer University Online library (https://research.strayer.edu) to locate academic resources. Note: Wikipedia and similar websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • This course requires the use of the new Strayer Writing Standards (SWS). Take a moment to review the SWS documentation for details. If you prefer to use APA style, discuss with your professor.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcome associated with this assignment is:

  • Make sound ethical decisions with consideration for legal precedence, supreme court decisions, statutory laws, and constitutional amendments.

watch the vedio and write about one country 1

https://www.pbs.org/wgbh/frontline/film/sickaround…

choose one country and write about the manged care system in that country and write 500 ward about it . you can not write about Canada and India because I already used them .

View the entire video Sick Around the world

You will answer key questions about this video in a separate assignment.

For your journal entries you will research managed practices for 2 countries —you may not choose the countries used as examples in our class, but you may expand on one of the countries introduced in the video. Since this video is dated, please include information from your current research on that country in your journal entry.

One entry per week each must be at least 500 words and include appropriate citations indicating research used.

prepare the memo in a maximum 700 words including the following information to better outline the situation

This week’s activity illustrates the role a company’s accounting method plays in financial statement reporting. In this assignment, students evaluate the events occurring in a business setting and determine how to properly analyze those events to identify the impact on both cash and accrual accounting methods.

Resources
  • Accounting Methods Grading Guide
  • Generally Accepted Accounting Principles (GAAP), U.S. Securities and Exchange Commission (SEC)
  • Tutorial help on Excel and Word functions can be found on the Microsoft Office website. There are also additional tutorials via the web offering support for Office products.
Assignment Steps

Scenario: BizCon, a consulting firm, has just completed its first year of operations. The company’s sales growth was explosive. To encourage clients to hire its services, BizCon offered 180-day financing – meaning its largest customers do not pay for nearly 6 months. Because BizCon is a new company, its equipment suppliers insist on being paid cash on delivery. Also, it had to pay up front for 2 years of insurance. At the end of the year, BizCon owed employees for one full month of salaries, but due to a cash shortfall, it promised to pay them the first week of next year.

As the senior accountant, the Chief Financial Officer has asked you to prepare a memo to be sent to management notifying them of the delayed wage payments.

Prepare the memo in a maximum 700 words including the following information to better outline the situation:

  • Explain how cash and accrual accounting differs for each of the events listed in the above scenario and describe the proper accrual accounting.
  • Assess how at the end of the year, BizCon reported a favorable net income, yet the company’s management is concerned because the company is very short of cash. Explain to management how BizCon could have positive net income and yet run out of cash.

Submit your assignment.

Resources:

paraphrase 188

I have a few paragraphs, and I need to paraphrase some of them as a different words or different method.

questions hypotheses and experiments 350 minimum words needed 200 for original post 150 for a response

In Chapter 7, we apply “thinking like a scientist” to the development of a new business concept.

For this discussion board, you are asked to :

  1. Briefly explain an idea you have for a new product or service (1-2 sentences).
  2. Identify at least three questions you would need to answer to develop this concept.
  3. From one of your questions, draft a hypothesis. What do you think will be true?
  4. Explain how you could test this hypothesis through an experiment.
  5. Please write a minimum 150 word response to one of the example posts and state which one you chose to respond too.

To complete this discussion board assignment, start by posting an original response that demonstrates critical thinking and effort. Your original post should be no less than 200 words.

This question does not require any outside research on your part, beyond posting the link of the organization you’re introducing. However, if you should choose to bring in any additional, outside sources, be sure to cite them in APA style as discussed in the syllabus.

EXAMPLE POSTS:

EXAMPLE 1 – Safety Harness

1) I would like to create a safety harness for a household pet. This will be used in emergency situations if the animal is in danger and needs to be lowered to the first floor from a window.

2) What type of material will need to be used to secure an animal? At what price point does it seem logical for a person to purchase this product? How would I introduce this product to the public?

3) What type of material will be need to be used to secure an animal? I would like to experiment with different canvas materials that will provide security and comfort for the animals being put into this harness. My main concern is getting the animal to safety under an emergency. There will be different thicker materials for larger animals. I believe that this concept can make a vital impact on a household because of how important the animal is to the family.

4) I will test this theory by making the prototype harness with different canvas materials. There will be stuffed animal that is weighted to the size of the harness. I will not be testing animals in this experiment because I do not want to put them in any harm.

OR

EXAMPLE 2 – Contact Lens

For my idea for a new product, I have mentioned before in one of the topics, is a futuristic contact lens. This contact lens is basically a computer inside your head when you put on the lens to your eyes.

A few questions I would need to answer for my product is if it will be safe in the long-run for peoples’ health since it is a computer-like contact lens. There will be some pushbacks for some people because it may seem unhealthy to put such a device near your eyes. Second question would be on pricing. How would we price our product when it is the first one out there? Lastly, our final question would be on who our primary target audience will be. Will it be used for government use only or can anyone use this device?

My hypothesis is that this product, a computer-like contact lens will be used for government use only. This is because since it is a computer in a contact lens, people can hack it if they are good enough to hack such a device, which can have a numerous of negative impact. This is why at first, this product should be used for government/military use only for now until there is a final fix so that nobody can hack it.

There could be some way of testing this hypothesis by having skilled hackers, from Google, Yahoo and private security companies try and find a way to get into the computer-like contact lens. If somehow there was a way to hack one of the computer-like contact lenses, there could be a way to protect the lenses from other hackers from getting in since the company will use these skilled hackers to help them from other hackers from getting in.

answer the question 303

In ONE PAGE, DOUBLE SPACE I need you to please talk about the role that trade played in the islamic world. How did the spread of islam create a new trading zone.

I also want you to provide me a similarity report.

2 4 page paper on 3 of the 5 exceptions to the exclusionary rule

2-4 page paper of 3 of the 5 exceptions to the exclusionary rule and your opinion about it. I have attached a file that contains the specific assignment instructions and grading criteria.

topic 1 dq 2 comment 1 1

***Please comment this***

The trait leadership theory makes me think of leaders of this county having children who follow in their footsteps as leaders. The mother or father teach the children how to be a leader with expectation that they will become leaders one day. These children are actively involved with leadership models who influence their personality and traits they display. The children tend to have the leadership role in their blood with high expectations from their successful parent who leads by example.

what does benedict anderson mean by calling a nation an imagined community

Essay question

What does Benedict Anderson mean by calling a nation an “imagined community”? How does such a conception come into being, according to Anderson? How useful or persuasive do you find his account?

Essay Requirements

1. Must be familiar with Benedict Anderson’s Imagined Communities

2. Essay should be 5-6 pages (double-spaced). Any reference style is acceptable as long as it is consistent. Always give references for direct quotes, as well as for information or evidence that you draw upon, and for particular opinions or approaches that you discuss.

3. The question, as given here, should be the title of the essay and written out at the top of essay. The essay should be an answer to the question exactly as set.

4. Use specific examples – refer to particular nations or nation-states and discuss them to illustrate your answer.

Suggestions

1. There is a brief but useful summary of the argument of Imagined Communities in the book by Umut Ozkirimli, Theories of Nationalism (3rd edition) , pp.114-112. Maybe you can find it online.

2. Please read the first three chapters carefully – “Introduction”, “Cultural Roots”, “The Origins of National Consciousness.” I think they are very important to answer the questions: what is meant by saying that the nation is an “imagined community”? How and why did the nation come to be seen in this way? In what ways does this concept differ from other concepts of the nation?

3. Chapter 7-9 (“The Last Wave”, “Patriotism and Racism”, “The Angel of History”) are also very important.

© Copyright - Savvy Writers