the research approval process

Directions:

Post a description of two ways the guidelines in Walden University’s IRB document may impact the selection of a research population, research setting, and/or research design. Please use the resources to support your answer.

Resources:

Ries, N. M. (2007). Growing up as a research subject: Ethical and legal issues in birth cohort studies involving genetic research. Health Law Journal, 15, 1–41.

Nicotera, N., & Walls, N. E. (2010). Challenging perceptions of academic research as bias free: Promoting a social justice framework in social work research methods courses. Journal of Teaching in Social Work, 30(3), 334–350.

normal distribution 25

Normal distribution question- question attached.

Question attached

using various articles discuss the roles of big data analytics in financial institutions

Using various articles, discuss the roles of Big Data Analytics in Financial Institutions.

Clues

Financial institutions include banking, insurance, credit bureau, mortgage companies etc.

Some possible roles

Fraud detection and prevention

Credit risk management

Marketing Analysis (to generate sales leads)

Customer relationship management

24/7 Security surveillance data storage and analysis (a very massive data)

You can use these points, but your explanation must be supported with articles’ citations and references. Credit will be given for more additional points.

Important Note:

You must use at least 3 related sources for this assignment.

Your citations and references must follow an APA format.

i need to post a discussion on the below topic

Part 1: Financial Acumen

Keeping abreast of the financial measures and metrics employed by a company allows employees to better understand its health and position at any given time. Using Campbellsville University library link or other libraries and the Internet:

1. Review at least three (3) articles on financial acuity. Summary the articles in 400 – 600 words. Use APA formatting throughout including in-text citations and references.

2. Discuss the benefits of establishing solid financial acumen in a company? Discuss your personal experiences in a situation where financial acumen was either not supported as an organizational hallmark or, conversely, was built into the company’s culture.

Part 2: SarbanesOxley (SOX)

Write a 200-word commentary on Sarbanes Oxley and the importance this act has for American businesses today. Your commentary should include the following:

A. Rationale for SOX
B. Provisions of SOX

C. Enforcement of SOX

essay 2 fiction analysis

Read “The Art of Fiction” (BL 5-6); “Types of Short Fiction” (6-15); “Plot” (BL 15-18); Updike, “A&P” (BL 18-23); “Point of View” (BL 28-32); Faulkner, “A Rose for Emily” (BL 32- 40); “Poe, “The Tell-Tale Heart” (BL 40-45); “Character” (BL 61-63); Wolff, “Bullet in the Brain” (BL 72-76); “Setting” (BL 101-104); Chopin, “The Storm” (BL 104-109); London, “To Build a Fire” (BL 109-122)

ASSIGNMENT:

Write a short essay (750 words) that defends a thesis you developed through a close critical reading/analysis of one (or two) of the works of fiction we’ve read in Weeks 1-2. The “critical response” essay relies on textual support from the primary text (secondary sources are not required) – not plot summary to develop your argument. Do not confuse “critical analysis” with “plot summary”: the goal is to develop, sustain, and advance a thesis based on a critique of the primary text.

What you’ll be graded upon:

Essay #2 (Fiction Analysis) Grading Rubric

Introduction: You establish a context for the significance of your thesis in regards to the literary work as a whole. How does your argument contribute to understanding the author’s major literary/thematic concerns? What can other readers learn from your analysis?

Thesis: You state your main point (or argument) in 1-2 sentences. The thesis is the culmination of your introduction.

Organization: Your essay should follow that of a typical literary critique:

Since your focus must be on analyzing some literary motif, theme, or a combination of literary elements (such as symbolism, character, setting, etc.), your essay must contain well-structured supporting paragraphs that contain a topic sentence, quotes from the primary text (secondary sources are not required), an explanation/discussion of the significance of the quotes you use in relation to your thesis, and a concluding sentence or two that situates the entire paragraph in relation to the thesis. Your thesis will focus on some kind of critical analysis of the primary text, so your supporting paragraphs should be organized around each of the quotes you use, explaining the significance of the quotes and why (or how) they illustrate your main point, but you also need to make sure that your paragraphs contain strong transitions and at least six (or more) sentences.

Conclusion: Regardless of the argument you make, you want a conclusion that avoids summarizing what you’ve just said, and please avoid writing, “In conclusion.…” Your aim in a conclusion is to place the discussion in a larger context. For example, how might your critical analysis of a literary character relate to the other characters in a work? How might your thesis be applied to other aspects of the text, say for example, setting or symbolism?

Grammar and mechanics: Your paper avoids basic grammar mistakes, such as dropped apostrophes in possessives, subject/verb disagreement, arbitrary tense switches, etc. The paper demonstrates a commitment to proofreading by avoiding easy-to-catch typos and word mistakes (effect for affect, for example). The paper adheres to MLA formatting style for in-text citations.

Presentation: Your paper meets the minimum length criteria of 750 words, is typed with a title and your name on it. Your paper must be fully double-spaced throughout to allow room for my comments and editing or the paper will be returned ungraded.

reply to discussion post below cmit wk4

Collins,

When trying to catch someone trying to steal your car or anything of value, the thought of advertising a decoy in order to catch someone always comes to mind. The same goes for trying to catch someone trying to hack into a network that you or a company may value. To setup a decoy, a honeypot is created (think honey like what Pooh Bear would REALLY want) that looks like a valid system on the network that is exposed and vulnerable for hackers to try to attack (EC-Council). If the attacker takes the bait, then that attacker will reveal his or her methods while trying to attack that system. The attacker would probably start passively scanning, but then quickly go to actively scanning and enumerating, and once the port of entry is decided upon, would attack using their preferred method of attack. Since legitimate users on the network have no need for the honeypot and may not even know it’s there, it is assumed that any attempts at accessing the honeypot will be considered hostile (Rouse).

Two different types of honeypots exist: production and research honeypots. Production honeypots are created to exist within the company’s network and to reveal attacks as well as slow down attackers while research honeypots are used to reveal types of attacks and discover new practices (Rouse). One really neat idea is to place data with unique identifying properties that can “help analysts track stolen data and identify connections between different participants in an attack (Rouse).”

The biggest downfall to honeypots is that, as we read in the Certified Ethical Hacker book, honeypots can be identified by enumerating the MAC addresses of the NICs or by probing the ports with TCP packets to see if they respond properly. Unfortunately, it’s not a perfect system but it would at least reveal some attacks!

EC-Council. UMUC: Certified Ethical Hacker (CEH) Version 10 eBook w/ iLabs (Volumes 1 through 4). [eVantage]. Retrieved from https://evantage.gilmoreglobal.com/#/books/9781635672343/

Rouse, M., Clark, C., & Cobb, M. (n.d.). What is honeypot (computing)? – Definition from WhatIs.com. Retrieved June 4, 2019, from https://searchsecurity.techtarget.com/definition/h…

compare and contrast two theories

Compare and contrast two change theories, and determine which theory makes the most sense for implementing your specific EBP project. Why? Has your mentor used either theory, and to what result?

hrm employment laws 1

Using law 19, Sarbanes-Oxley act of 2003 from this attached document, submit a 2-3 page summary of the law based on these questions:

1. Explain the law or regulation, who it pertains to (and does not)

2. Why it was needed, who it affects – and who was the President at the time.

3. Is it currently effective, and why?

pension plan and journal entries

Analyze the specific outcomes and write an analysis directed toward the team at Suma Corp. describing what the numbers mean and how they relate to the business. Submit journal entries in an Excel file and written segments in an MS Word documentt. See attachments.

answer the question s below number each question you answer at least 300 words at least 3 reference citation in apa

Please put the question number down first before responding. Answer each question seperately — not combined or else no credit.

1. Are you comfortable with giving away some of your privacy for increased security?

2. Why or why not? How far would you let the government go in examining people’s private lives?

3. Or how much access should we have to certain aspects of others’ private lives?

4. For example, should States share criminal databases?

5. Many TV shows depict law enforcement personnel accessing readily accessible databases that contain all types of records about individuals –records about everything from address to telephone records to finances, insurance, and criminal history. Specifically, should a database of people paroled or released for crimes be made public?

6. Why or why not? (most be answered separately from question 5)

7. What about those who have committed other types of crimes?

8. Who should have access to the database? Why?

9. Is there a global impact? Yes or no?