project management

project management

Instructions –

PLEASE READ THEM CAREFULLY
• The Assignment must be submitted on Blackboard (WORD format only) via allocated folder.
• Assignments submitted through email will not be accepted.
• Students are advised to make their work clear and well presented, marks may be reduced for poor presentation. This includes filling your information on the cover page.
• Students must mention question number clearly in their answer.
• Late submission will NOT be accepted.
• Avoid plagiarism, the work should be in your own words, copying from students or other resources without proper referencing will result in ZERO marks. No exceptions. At least two Scholarly Peer- Reviewed Journals are required as references.
• All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures containing text will be accepted and will be considered plagiarism).
• Submissions without this cover page will NOT be accepted.
• Do not make any changes in the cover page.
Assignment Workload:
• This Assignment comprise of a Case Study and Discussion questions.
• Assignment is to be submitted by each student individually.

Assignment Purposes/Learning Outcomes:
After completion of Assignment-3 students will able to understand the

1. Defining the concepts, theories and approaches of project management. (L.O-1.1)
2. Analyze to work effectively and efficiently as a team member for project related cases. (L.O-3.1)
3. Evaluate to monitor and control the project. (L.O-3.2)

Assignment-3: Case Study & Discussion questions

Assignment Question: (Marks 10)

Please read the Case-8.3 “Tham Luang Cave Rescue.” from Chapter 8 “Scheduling Resources and Costs” given in your textbook – Project Management: The Managerial Process 8th edition by Larson and Gray page no: 304-307 also refer to specific concepts you have learned from the chapter to support your answers. Answer the following questions for Part-1, Part-2.

Part-1: Case study questions

1. How did the physical environment of the cave affect the rescue plan? Explain in 250 words (3 Marks).

2. How did the rescue team respond to the risks of the project? Explain in 250 words (3 Marks).

3. Some have called the rescue a miracle and that luck was the decisive factor. Do you agree? Explain in 150 words (2 Marks)

Part-2: Discussion questions

Please read Chapter 8 Pg-No. 279 & 281 carefully and then give your answers on the basis of your understanding.

4. Why would people resist a multi project resource scheduling system? (1 Mark) (100 words)

5. What do you think would have happened if the Washington Forest Service did not assess the impact of resources on their two-year plan? (1 Mark) (100 words).

 

 

 

 

 

 

 

Historical And Legal

Historical And Legal

Discussion Question:

Learn about the role of denominational colleges for the U.S. system of higher education. From this reading and observation, how did the emergence of denominational colleges shape the American higher education landscape? How did this evolution make an impact on all colleges and universities today?

Discussion Question:

Examine the topic of higher education for women. This evolution has certainly been a dynamic one wherein social and cultural changes have helped shape the evolution of this important topic. Provide a synthesis of what you learned about higher education for women in the readings for this learning module and describe how this historic evolution had an impact in higher education both at the point of origin as well as the impacts that continue to shape the higher education landscape for men and women today.

Note

Must be at least 300 words

Financial illusion

Financial illusion

Background

For years, Dell’s seemingly magical power to squeeze efficiencies out of its supply chain and drive down costs made it a darling of the financial markets. Now we learn that the magic was at least partly the result of a huge financial illusion. On July 22, 2010, Dell agreed to pay a $100 million penalty to settle allegations by the SEC that the company had “manipulated its accounting over an extended period to project financial results that the company wished it had achieved.”

According to the commission, Dell would have missed analysts’ earnings expectations in every quarter between 2002 and 2006 were it not for its accounting shenanigans. This involved a deal with Intel, a big microchip maker, under which Dell agreed to use Intel’s central processing unit chips exclusively in its computers in return for a series of undisclosed payments, locking out Advanced Micro Devices (AMD), a big rival. The SEC’s complaint said that Dell had maintained cookie-jar reserves using Intel’s money that it could dip into to cover any shortfalls in its operating results.

The SEC said that the company should have disclosed to investors that it was drawing on these reserves, but it did not. And it claimed that, at their peak, the exclusivity payments from Intel represented 76% of Dell’s quarterly operating income, which is a shocking figure. The problem arose when Dell’s quarterly earnings fell sharply in 2007 after it ended the arrangement with Intel. The SEC alleged that Dell attributed the drop to an aggressive product-pricing strategy and higher-than-expected component prices, when the real reason was that the payments from Intel had dried up.

The accounting fraud embarrassed the once-squeaky-clean Michael Dell, the firm’s founder and CEO. He and Kevin Rollins, a former top official of the company, agreed to each pay a $4 million penalty without admitting or denying the SEC’s allegations. Several senior financial executives at Dell also incurred penalties. “Accuracy and completeness are the touchstones of public company disclosure under the federal securities laws,” said Robert Khuzami of the SEC’s enforcement division when announcing the settlement deal. “Michael Dell and other senior Dell executives fell short of that standard repeatedly over many years.”

In its statement on the SEC settlement the company played down Michael Dell’s personal involvement, saying that his $4 million penalty was not connected to the accounting fraud charges being settled by the company, but was “limited to claims in which only negligence, and not fraudulent intent, is required to establish liability, as well as secondary liability claims for other non-fraud charges.”1

Accounting Irregularities

The SEC charged Dell Computer with fraud for materially misstating its operating results from FY2002 to FY2005. In addition to Dell and Rollins, the SEC also charged former Dell chief accounting officer (CAO) Robert W. Davis for his role in the company’s accounting fraud. The SEC’s complaint against Davis alleged that he materially misrepresented Dell’s financial results by using various cookie-jar reserves to cover shortfalls in operating results and engaged in other reserve manipulations from FY2002 to FY2005, including improper recording of large payments from Intel as operating expense-offsets. This fraudulent accounting made it appear that Dell was consistently meeting Wall Street earnings targets (i.e., net operating income) through the company’s management and operations. The SEC’s complaint further alleged that the reserve manipulations allowed Dell to misstate materially its operating expenses as a percentage of revenue—an important financial metric that Dell highlighted to investors.2

The company engaged in the questionable use of reserve accounts to smooth net income. Davis directed Dell assistant controller Randall D. Imhoff and his subordinates, when they identified reserved amounts that were no longer needed for bona fide liabilities, to check with him about what to do with the excess reserves instead of just releasing them to the income statement. In many cases, he ordered his team to transfer the amounts to an “other accrued liabilities” account. According to the SEC, “Davis viewed the ‘Corporate Contingencies’ as a way to offset future liabilities. He substantially participated in the ‘earmarking’ of the excess accruals for various purposes.”

Beginning in the 1990s, Intel had a marketing campaign that paid its vendors certain marketing rebates to use their products according to a written contract. These were known as market developing funds (MDFs), which, according to accounting rules, Dell could treat as reductions in operating expenses because these payments offset expenses that Dell incurred in marketing Intel’s products. However, the character of these payments changed in 2001, when Intel began to provide additional rebates to Dell and a few other companies that were outside the contractual agreements.

Intel made these large payments to Dell from 2001 to 2006 to refrain from using chips or processors manufactured by Intel’s main rival, AMD. Rather than disclosing these material payments to investors, Dell decided that it would be better to incorporate these funds into their component costs without any recognition of their existence. The nondisclosure of these payments caused fraudulent misrepresentation, allowing Dell to report increased profitability over these years.

These payments grew significantly over the years making up a rather large part of Dell’s operating income. When viewed as a percentage of operating income, these payments started at about 10% in FY2003 and increased to about 76% in the first quarter of FY2007.

When Dell began using AMD as a secondary supplier of chips in 2006, Intel cut the exclusivity payments off, which resulted in Dell having to report a decrease in profits. Rather than disclose the loss of the exclusivity payments as the reason for the decrease in profitability, Dell continued to mislead investors.

Dell’s Internal Investigation

On August 16, 2007, Dell announced it had completed an internal investigation, which had revealed a variety of accounting errors and irregularities and that it would restate results for FY2003 through FY2006, and the first quarter of 2007. The restatement cited certain accounting errors and irregularities in those financial statements as the reasons the previously issued statements should no longer be relied upon.

Dell said that the investigation of accounting issues found that executives wrongfully manipulated accruals and account balances, often to meet Wall Street quarterly financial expectations in prior years. The company was forced to restate its earnings during that time period, which lowered its total earnings during that time by $50 million to $150 million.

As result of the SEC’s investigation, Dell took another hit to its bottom line. With the restatement, Dell’s first quarter 2011 earnings looked like this: net income of $341 million and earnings of 17¢ per share. That’s instead of the initially reported $441 million and 22¢ per share.

Price Waterhouse Coopers (PwC)

PwC had been Dell’s independent auditor since 1986 and had signed off on every one of Dell’s financial statements that were on file with the SEC. From 2003 to 2007, Dell paid PwC more than $50 million to perform auditing and other services. PwC issued clean (unmodified) audit opinions for the 2003 to 2006 financial statements, saying that they fairly represented the financial position of Dell.

It was alleged that PwC had consistently approved the now-restated financial statements as prepared in accordance with generally accepted accounting principles and did not conduct an audit in accordance with generally accepted auditing standards. The argument was that the opinions that the financial statements fairly represented financial position were materially false and misleading. The court ruled that the restatement does not by itself satisfy the sci-enter (knowledge of the falsehood) requirement to hold the auditors legally liable for deliberate misrepresentation of material facts or actions taken with severe recklessness as to the accuracy of its audits or reports.

The legal standard for auditor liability under Section 10(b) of the Securities Exchange Act of 1934 and Rule 10b-5 requires that the plaintiff must show (1) a misstatement or omission, (2) of a material fact, (3) made with scienter, (4) on which the plaintiff relied, and (5) that proximately caused the injury. The court pointed out in its opinion that “the mere publication of inaccurate accounting figures, or failure to follow GAAP, without more, does not establish scienter.” To establish scienter adequately, the plaintiffs must state with particularity facts giving rise to a strong inference that the party knew that it was publishing materially false information, or that it was severely reckless in publishing such information. The court ruled that the plaintiffs did not prove fraudulent intent.

In a suit by shareholders against the firm, PwC was accused of a variety of charges, including not being truly independent and ignoring red flags. These charges were dismissed on a basis of lack of evidence to support the accusations.

Questions

In his analysis of the Dell fraud for Forbes, Edward Hess comments: “Too often, the market’s maniacal focus on creating ever-increasing quarterly earnings drives bad corporate behavior, as it apparently did at Dell. That behavior produces non-authentic earnings that obscure what is really happening in business. Short-termism can result in a range of corporate and financial games that may enrich management at the expense of market integrity and efficient investor capital allocation.”4 Comment on Hess’s statement from two perspectives: earnings management and financial analysts earnings projections.

Explain the difference between financial statement fraud and disclosure fraud. How did Dell use each one to produce materially misstated financial results?

Do you agree with the court opinion that PwC did not act with fraudulent intent, therefore, not holding it legally liable? How can fraudulent intent be established in a case like Dell?

Assessing Musculoskeletal Pain

Assessing Musculoskeletal Pain

A 15-year-old male reports dull pain in both knees. Sometimes one or both knees click, and the patient describes a catching sensation under the patella. In determining the causes of the knee pain, what additional history do you need? What categories can you use to differentiate knee pain? What are your specific differential diagnoses for knee pain? What physical examination will you perform?

What anatomic structures are you assessing as part of the physical examination? What special maneuvers will you perform?

strategic use of countertrade schemes

strategic use of countertrade schemes

How might a company make strategic use of countertrade schemes as a marketing weapon to generate export revenues? How might a company make strategic use of countertrade schemes as a marketing weapon to generate export revenues?

What are the risks associated with pursuing such as strategy? at are the risks associated with pursuing such as strategy?

Human Behavior Social Environment

Human Behavior Social Environment

  Discussion

In Chapter 13, you were presented with a global development case study utilizing the three feminist principles (see highlights 13-4, starting on page 506).  Based on what you read, address the following questions:

  1. To what extent do you agree with the three feminist principles presented?
  2. How valuable did the principles seem in implementing the three programmatic examples? Explain.
  3. To what extent do these feminist principles help to advance social and economic justice? Explain.

Week 15: Theoretical Functions of Communities

Objectives

Instructions

Part 1: Match the following theoretical functions of communities from chapter 13 with their respective descriptions.

Part 2: After matching, address the following prompts (a & b) on page 2.

Theoretical Function of Communities (Warren, 1983)

  1. Production-distribution-consumption
  2. Socialization
  3. Social control
  4. Social participation
  5. Mutual support

_____   A.            Concerns the involvement of citizens in social, political, and economic processes.

_____   B.            Relates to “local participation in the process of producing, distributing, and consuming those goods and services that are a part of daily living and access to which is desirable in the immediate locality” (pp. 28–29).

____   C.            Involves encouragement, assistance, caring, and cooperation among people in communities.

_____   D.            Involves “the process through which a group influences the behavior of its members toward conformity with its norms” (p. 29).

_____   E.            Concerns a “process by which society or one of its constituent social units transmits prevailing knowledge, social values, and behavior patterns to its members” (p. 29).

  1. After matching, answer and respond to the following:
  2. What concepts in the definitions characterize each function and make that function unique?
  3. What are the similarities and differences among the functions?

 

 

Reading Vignette

Reading Vignette

After reviewing this week’s learning materials, in no less than 250 words, please address the following three prompts in your initial post. Be sure to include numbers (1, 2, 3) to organize your post. Also, in your initial post, include the word count of your answer (not including the prompts/questions) and include page numbers from the textbook.

Reading Vignette:

Carolyn Carlson is a 22-year old Caucasian female who is starting therapy to work on her low self-esteem. Carolyn reluctantly states that she has “problems throwing up.” When you inquire further, she elaborates that she began vomiting as a teenager to control her weight. She stated that she learned about purging methods from peers as well as online searches. Carolyn stated that after she vomits, she feels immediately relief, but then admitted that she feels embarrassed, ashamed, and worthless.

Throughout your interview, you gather information regarding her eating patterns. Carolyn states that her intense fear of gaining weight intensified in high school. She began skipping meals (ie., does not eat breakfast) around 16 years old. Shortly after she entered college, at 18 years old, she began vomiting to compensate for her “binges.” Carolyn describes her binges as “overeating whenever stressed with school, friends, life in general.” An example of a binge was “eating half a cheeseburger and a few fries.” Due to these patterns, Carolyn has a significantly low weight and stated that she feels light headed sometimes.

***READING VIGNETTE***

1) discuss some differences between anorexia and bulimia?

2) Briefly describe at least two treatments for eating disorders.
3) After reading the provided Vignette, write about your experience diagnosing the patient. What symptoms stood out to you? Did you correctly identify the eating disorder? Would you describe this experience as challenging, easy, or somewhere in between?

 

Moral-ethical dilemmas

Moral-ethical dilemmas

Read/review the following resources for this activity:
•Read/review the following resources for this activity:
• Textbook: Chapter 13
• Lesson
• Narrated PowerPoint Tutorial (Links to an external site.) (Make sure to review this tutorial before you begin recording.)
Introduction
In this session, you have been considering moral-ethical dilemmas you yourself faced or that you know of that you either resolved or failed to resolve, but hopefully learned from. You may never have given much thought to ethical theory nor what ethical premises/paradigms you have unconsciously held.
You will be focusing on this case for this assignment:
Jane Doe is a nursing student at University X. Jane is in week eight of a course entitled: “Introduction to Ethics”.
For the week one discussion, Jane copied work done by her friend John Doe in the same class two months ago (with a different professor). John told Jane it was okay to use his work as John’s professor never checked any work in the class using Turnitin.com. John claimed to have earned an A on the work also.
In week two, Jane went to StudentPapering.com and paid ten dollars for a week two essay done by a student (not John Doe) who took the same course four months ago. Student Papering promises that all its archived work is of excellent quality and cannot be detected as copied. Jane then uploaded an exact copy of the work for the week two assignment.
In week three, Jane paid a worker at PaperingStudent.com ten dollars to write for Jane a brand new essay after Jane shared with the worker the essay assignment instructions.

In week four, Jane relied on her knowledge of Esperanto. She felt pressed for time and found an article by a professor from Esperanto on the week four topic. She translated Esperanto into English using Moogle Translate, and the translated text served as her week four paper.
In week five, Jane was running late again. Jane purposely uploaded a blank paper hoping that she would later claim it was an innocent mistake and not be assessed a late penalty. In a previous course on History, she had done the same (with an earlier paper from the History class rather than simply a blank) and had not seen any late penalty assessed.

In week six, Jane took work she did in a nursing course from a year ago and submitted that for her discussion posting in her current class. She simply copied and pasted the work she had labored intensively on a year ago (even though University X forbids this practice as ‘self-plagiarism’). Jane was confident her Nursing instructor never checked that work using Turnitin.com or another method.

In week seven, Jane copied and pasted work found on website.com for the paper. Jane did not use any quotation marks or other documentation to show the text was not by Jane.
Since Jane’s Ethics professor did not check papers and posting for any issues by using Turnitin.com or another method, the professor graded all of Jane’s work unaware of Jane’s actions throughout the weeks of the class. Jane feels her actions are morally justified both because her economic situation requires her to work too much to devote time to school (although other students are well-off enough to have such time) and her religion forbids cheating, but Jane ignores her religion’s teachings.
Instructions
Now that you have had an opportunity to explore ethics formally, create a reflective assessment of your learning experience and the collaborations you engaged in throughout this session. You will submit both of the following:
• A written reflection
• An oral presentation using a PowerPoint narrated slide show.
For the written reflection, address Jane Doe’s and respond to the following:
• Articulate again your moral theory from week eight discussion (You can revise it if you wish). What two ethical theories best apply to it? Why those two?
• Apply to Jane Doe’s case your personal moral philosophy as developed in week eight discussion and now. Use it to determine if what Jane Doe did was ethical or unethical per your own moral philosophy.
• Consider if some of these examples are more grave instances of ethical transgressions than others. Explain.
• Propose a course of social action and a solution by using the ethics of egoism, utilitarianism, the “veil of ignorance” method, deontological principles, and/or a theory of justice to deal with students like Jane. Consider social values such as those concerning ways of life while appraising the interests of diverse populations (for instance, those of differing religions and economic status).
For the oral presentation, briefly summarize your feelings about taking a course in Ethics and explore your process of transformation in this course.
• Discuss your experiences of the course, your beginnings, and where you are now. Consider your interaction in discussions.
Should health care workers be required to take a course in Ethics? Why or why not
Writing Requirements (APA format)
• Length: 3-4 pages (not including title page or references page)
• 1-inch margins
• Double spaced
• 12-point Times New Roman font
• Title page
• References page (minimum of 2 scholarly sources)
Presentation Requirements
• Length: 2-3 minutes

Textbook: Chapter 13
• Lesson
• Narrated PowerPoint Tutorial (Links to an external site.) (Make sure to review this tutorial before you begin recording.)
Introduction
In this session, you have been considering moral-ethical dilemmas you yourself faced or that you know of that you either resolved or failed to resolve, but hopefully learned from. You may never have given much thought to ethical theory nor what ethical premises/paradigms you have unconsciously held.
You will be focusing on this case for this assignment:
Jane Doe is a nursing student at University X. Jane is in week eight of a course entitled: “Introduction to Ethics”.
For the week one discussion, Jane copied work done by her friend John Doe in the same class two months ago (with a different professor). John told Jane it was okay to use his work as John’s professor never checked any work in the class using Turnitin.com. John claimed to have earned an A on the work also.
In week two, Jane went to StudentPapering.com and paid ten dollars for a week two essay done by a student (not John Doe) who took the same course four months ago. Student Papering promises that all its archived work is of excellent quality and cannot be detected as copied. Jane then uploaded an exact copy of the work for the week two assignment.
In week three, Jane paid a worker at PaperingStudent.com ten dollars to write for Jane a brand new essay after Jane shared with the worker the essay assignment instructions.

In week four, Jane relied on her knowledge of Esperanto. She felt pressed for time and found an article by a professor from Esperanto on the week four topic. She translated Esperanto into English using Moogle Translate, and the translated text served as her week four paper.
In week five, Jane was running late again. Jane purposely uploaded a blank paper hoping that she would later claim it was an innocent mistake and not be assessed a late penalty. In a previous course on History, she had done the same (with an earlier paper from the History class rather than simply a blank) and had not seen any late penalty assessed.

In week six, Jane took work she did in a nursing course from a year ago and submitted that for her discussion posting in her current class. She simply copied and pasted the work she had labored intensively on a year ago (even though University X forbids this practice as ‘self-plagiarism’). Jane was confident her Nursing instructor never checked that work using Turnitin.com or another method.

In week seven, Jane copied and pasted work found on website.com for the paper. Jane did not use any quotation marks or other documentation to show the text was not by Jane.
Since Jane’s Ethics professor did not check papers and posting for any issues by using Turnitin.com or another method, the professor graded all of Jane’s work unaware of Jane’s actions throughout the weeks of the class. Jane feels her actions are morally justified both because her economic situation requires her to work too much to devote time to school (although other students are well-off enough to have such time) and her religion forbids cheating, but Jane ignores her religion’s teachings.
Instructions
Now that you have had an opportunity to explore ethics formally, create a reflective assessment of your learning experience and the collaborations you engaged in throughout this session. You will submit both of the following:
• A written reflection
• An oral presentation using a PowerPoint narrated slide show.
For the written reflection, address Jane Doe’s and respond to the following:
• Articulate again your moral theory from week eight discussion (You can revise it if you wish). What two ethical theories best apply to it? Why those two?
• Apply to Jane Doe’s case your personal moral philosophy as developed in week eight discussion and now. Use it to determine if what Jane Doe did was ethical or unethical per your own moral philosophy.
• Consider if some of these examples are more grave instances of ethical transgressions than others. Explain.
• Propose a course of social action and a solution by using the ethics of egoism, utilitarianism, the “veil of ignorance” method, deontological principles, and/or a theory of justice to deal with students like Jane. Consider social values such as those concerning ways of life while appraising the interests of diverse populations (for instance, those of differing religions and economic status).
For the oral presentation, briefly summarize your feelings about taking a course in Ethics and explore your process of transformation in this course.
• Discuss your experiences of the course, your beginnings, and where you are now. Consider your interaction in discussions.
• Should health care workers be required to take a course in Ethics? Why or why not

Writing Requirements (APA format)

• Length: 3-4 pages (not including title page or references page)
• 1-inch margins
• Double spaced
• 12-point Times New Roman font
• Title page
• References page (minimum of 2 scholarly sources)
Presentation Requirements
• Length: 2-3 minutes

Healthcare Policy Analysis

Healthcare Policy Analysis

Final Paper : 150 points
It is expected that the final version of your Healthcare Policy Analysis

Note

Paper will be 8-10 pages in length, with 6-8 sources identified. Your paper should be 12-pt. Times New Roman font, double spaced, with standard margins. You should have a thesis statement in your introduction identifying the legislation/policy that your paper will be addressing. Please download and review the Grading Rubric for the Final Paper (Links to an external site.).

APA in-text citation is required in addition to listing all of your sources on a Works Cited Page at the end of the document. Your grade will be affected if you do not cite or identify your sources correctly.

Below is a list of questions that should be addressed in the body of your paper.

What is the legislation/policy that will be analyzed in this paper?
What is the problem/issue that this legislation attempts to address?
What is the history of the legislation?
Has (or will) the legislation been effective in addressing the problem or issue?
What group(s) of people have been the most affected by the problem?
Is there any information on the future of this legislation? (Revision, obsolete, status of bill, etc.)
Do you feel that there could have been a non-legislative or free market solution to the problem/issue addressed by this legislation? Please discuss.

Digital Media and Society

Digital Media and Society

RESEARCH TOPICS.
SELECT ONE TOPIC
Select one of the 12 research topics below and complete ALL THREE sections:
Topic 1: Digital Media as a Distraction (Week 1)
Digital Nation: Life on the Virtual Frontier – Chapter 1: Distracted by Everything PBS Online Video Documentary Series – Chapter 1 (00:00 – 08:28 minutes) https://www.pbs.org/wgbh/frontline/film/digitalnation/

Topic 2: The Use of Digital and Social Media in Politics (Week 2)
(Smartphone political ads target non-political events to talk directly to voters, one by one (web page) https://www.meadvilletribune.com/news/local_news/smartphone-political-ads-target-non-political-events-to-talk-directly/article_e5f0eeeb-f7ee-5c28-8b10-343996ab45a1.html.

Topic 3: Virtual Worlds and Their Impact on Society (Week 3)
Digital Nation: Life on the Virtual Frontier- Chapter 7 Virtual Worlds PBS Online Video Documentary Series – Start the video then Navigate to Chapter 7 (52:05 – 1:01:26) https://www.pbs.org/wgbh/frontline/film/digitalnation/.

Topic 4: Fake News (Week 3)
Fake News Vs Real News (PBS Online video) https://www.pbs.org/video/fake-news-vs-real-news-ltadaw/.
Topic 5: The Digital Divide (Week 6)
Digital Divides 2016 | Pew Research Center http://www.pewinternet.org/topics/digital-divide/2017
Small towns join forces to bridge the digital divide (YouTube video) https://www.youtube.com/watch?v=txMijyHgAyg.
Topic 6: E-commerce (Week 7)
How Amazon Controls E-commerce: Amazon.com the Hidden empire: (online slideshow – 84 slides) https://techcrunch.com/2011/05/11/how-amazon-controls-ecommerce-slides/.
SECTION 1: SELECT ONE TOPIC FROM THE 6 TOPICS LISTED ABOVE
Answer the questions below:
Item 1: Which topic did you select?
Item 2: Why does this topic appeal to you?
NOTE 1: Section 1 should be the shortest section of your paper (10-15%).
ECTION 2: SUMMARIZE THE TOPIC YOU SELECTED USING CLASS RESOURCES
Discuss your topic as presented in class. This is a summary of all the resources used in class relating to the topic including online discussions.
Item 1: Summarize the information on the topic as presented in the class, using the Read & Watch resources AND any classroom discussion (online or f2f) of the topic.
Item 2: Is the topic you selected relevant in a course on digital and social media? Whether you answer yes or no, justify your answer.
Section 2 Sources: Include the source(s) as an in-paper citation and on your References page.
NOTE 2: Section 2 should comprise (30-40%) of your paper.
SECTION 3: CONDUCT ADDITIONAL RESEARCH ON THE TOPIC
Provide additional information on the topic you selected by locating ONE new resource (in addition to the resources provided in class) to expand your knowledge of the topic.
Item 1: What additional source did you find on the topic you selected?
Item 2: Why is the source you found (a) relevant, (b) credible, (c) accurate, and (d) unbiased based on what you learned from UMGC’s Guide to Evaluating Research Sources? Address a-d in your answer.
Item 3: What new information did the source contribute to the topic as presented in class?
Section 3 Source: Include at least ONE SOURCE related to your topic that has NOT been presented, discussed, or posted in the weekly Read & Watch in class or posted in the topic list above. Include this source as in-paper citation and include it on your References page.

NOTE 3:

Section 3 should comprise the majority of your paper (45-60%). This is where your primary focus should be.
Length: Minimum of 1,000
(Title page, Reference page, and direct quotes do not count toward the total word count).
NOTE 4: Going over 1,500 words is fine, but if you are under 900 words you will be penalized (10%).
Your References page must be APA formatted.

Current Trends and Projects in Computer Networks and Cybersecurity.
Part 4: Machine Learning and Data Analytics

o Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
o Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?
Part 5: Using Machine Learning and Data Analytics to Prevent APT

o Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.