Archive for October 11th, 2020

Head start mini analysis

For this assignment, students are expected to conduct a “mini” policy analysis of Head Start policy. The goal of this assignment is help students learn how to apply a policy analysis framework to Head Start policy. To conduct the analysis, students will need to find 3 articles that concern and describe the Head Start legislation.The analysis should address the following points:

Benefit-Allocation Framework: Who, what, how, and how much ($)
Social, Economic, Environmental Justice Analysis/Human Rights framework: How does this policy impact social, economic, environmental justice and/or human rights?Use Gilbert and Terrells notions of Equality, Equity, Adequacy
Policy Effectiveness (When searching for article about effectiveness, please use the term outcomes, effects, or impacts as the search key words).

Start article with head start over view file I attached then follow by these two links of  articles I attached right here for body of paper to answer questions in order as written in instructions and the Gilbert reading attached with the picture files:

Then use these sources for rest of paper: https://www.brookings.edu/research/the-long-term-impact-of-the-head-start-program/ https://www.nber.org/papers/w12973

Conclude with this article:
https://www.urban.org/research/publication/where-budget-headed-one-year-trump-administration

Discuss the evolving impact of the internet on gender identities among Muslim Americans.

Step One – Read Amina Yaqin, “Islamic Barbie: The Politics of Gender and Performativity”

Step 2: Identify and read an additional se condary source (or sources) on a related topic that you find interesting (perhaps looking at comparable experiences of females and males from another ethnic or religious group or another nation outside the US).

Step 2: Write a 300-400 word response analyzing the reading.
Use a word processor (like MS Word) to write your response to one the following questions (please don’t all pick the first question – the discussion will be much richer if we have a variety of topics to discuss):

1.What stereotypes does Yaqin identify regarding Muslims?  Based on your research, have these stereotypes changed in recent years?

2.Why was Razanne created?  How does it compare with Barbie, for example?

3.What role does the internet play for Noorart?  Why is this significant?

Any topic (writer’s choice)

The format for your week 3 discussion is a Talking Points Paper. Talking points help decision-makers/leaders/managers make decisions. Decision-makers use talking points instead of (or in addition to) reading lengthy reports because the talking points only include the pertinent facts and/or the bottom line – meaning each talking point stands alone in the context of the paper topic.

Prepare a set of talking points (3 to 5 paragraphs or 5 categories / 20-25 bullet points total) that address the following information request:

How does FedRAMP help agencies ensure the security of digital government services?

Your talking points must address the following:

What is meant by “Digital Government services?” (previously called “e-Government” services)
FedRAMP (what it is, how agencies use FedRAMP to deliver Digital Services, and how FedRAMP contributes to improved security for Digital Services)
Additional strategies for improving privacy and security (Play #11) from the Federal CIO Council’s Digital Services Playbook (“Manage security and privacy through reusable processes”) — make sure that you address the “Checklist” and “Key Questions”
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Note: this assignment asks for paragraphs (including full sentences), not short phrases. Thus, each talking point should have at least one full sentence. You may use Bullets or Number to identify each distinct talking point. In most cases, each of your talking points will be multiple sentences to ensure you explain the point.

Week 6 Writing A Qualitative Prospectus

Assignment: Committee Request (Graded Pass/Fail; required to Pass course)
This week, you will complete the Committee Matching Request Form using the link below. Program leadership will use information provided via this form to review your plans and needs to match you with an appropriate committee chair and second committee member. While not required, you may request specific faculty from your program to serve on your committee. Please note that, while we would like to honor all requests, the program leadership must take a number of factors into consideration, such as faculty availability and expertise, when completing matches.

This online form provides us with information, including but not limited to, your name, email, student ID, specialization, and copy of your current prospectus or premise document.

Online Form: Committee Matching Request Form

By Day 7
After you complete the form, you will receive an email confirming receipt. Please save this email as a PDF or Word file and upload to the Assignment submission link for review no later than Day 7 of Week 6.

Submission and Grading Information
To submit your completed Assignment for review and grading, do the following:

Please save your Assignment using the naming convention WK6Assgn+last name+first initial.(extension) as the name.
Click the Week 6 Assignment link.
Next, from the Attach File area, click on the Browse My Computer button. Find the document you saved as WK6Assgn+last name+first initial.(extension) and click Open.
If applicable: From the Plagiarism Tools area, click the checkbox for I agree to submit my paper(s) to the Global Reference Database.
Click on the Submit button to complete your submission.
Grading Criteria
To access your rubric:

Week 6 Assignment Rubric

Submit Your Assignment by Day 7
To submit your Assignment:

Week 6 Assignment

Information Technology

You will research an area related to computer forensics. Find a professional article on the topic, and write a 750-1000 word essay in which you summarize the article in detail and explain its relevance to computer forensics. For maximum credit, your essay should also include references to additional reputable sources which could be articles, papers, blog postings, etc. Please use MLA format in your references and citations.

Any topic (writer’s choice)

PAPER! READ THE ARTICLES ABOVE AND NICKEL AND DIMED. CHOOSE ONE PERSON IN THE BOOK THAT EHRENREICH MET AND WRITE A PAPER DESCRIBING THEIR LIFE, THEIR ECONOMIC ISSUES, HOW THEY LIVE, AND HOW YOU, AS A SOCIAL WORKER COULD HELP THEM. HOW DOES YOUR CHARACTER FIT WITH THE MCINTYRE ARTICLE? WHAT SORT OF COMMUNITY DOES THIS PERSON LIVE IN ? DOES THIS CONTRIBUTE TO THEIR POVERTY? THIS IS A SHORT PAPER, PERHAPS 5 OR 6 PAGES OF GOOD, WELL-THOUGHT OUT TEXT.

Primary source analysis

Compare and contrast the case histories of Hippocrates (Week 2), Galen (Week 2), and Jenner (Week 6).  What are the different structures of the case histories written by each of these authors?  What information did Hippocrates, Galen, and Jenner choose to include? How do their choices differ?  What are the main purposes of these case histories and how do they differ?

The Future of Information Security

Write a 2-4 page paper (not including title or reference pages) with your thoughts and opinions based on what youve learned in this class on how the landscape of data privacy will change in the next 50 years as it relates to information systems and knowledge sharing. Include your thoughts on:

The role of government in data ethics, management, and security
The role of the organization in data ethics, management, and security
The role of the individual in having the freedom to choose how their data is used, levels of anonymity, and for how long their data is stored
What ownership rights should and shouldnt coexist with ones data.

Organizations must share data. As more and more corporations share information with each other, more and more vulnerabilities exist. However, consumers and employees do not completely own the data they generate depending on the context. For example, while a health record may be about you, and you have certain granted rights to view that record, you do not own the record. The vast majority of data on or about a person or company is not owned by that person or company. 

Recall the text and other readings talk about data discounts. For example, if you plug in a data logging device to your car, you may receive an insurance discount. But, who determined the correlation between certain driving behaviors (e.g., rate of acceleration) and accident likelihood? Who vetted this research as factual as opposed to someone simply enjoying their sporty automobile? What other data is collected about my driving? Location? Can this data be used against me if a claim were to arise? Could that data be subpoenaed by an opposing attorney in an accident with injuries case to attempt to identify fault? Finally, if you opt out from data collection, is it fair to be penalized (e.g., pay a higher rate or not receive a discount)? The future of analytics-based decision making is here but is it a fair way to treat an individual; as a data point?

How do performers approach Bach’s solo instrumental music differently?

Project 2: Summary Report on critical reading of two pieces of research (research article, a book, or a book chapter)

Read and summarize two pieces of closely related literature to your topic; summarize briefly and succinctly each piece by describing the research problem, method, findings, and relevance to your research question(s).
One page in length for each piece, double-spaced. Font choices include Arial or Times New Roman, or something similar, font size 12.
Be sure to include your research topic or question, your name, and full bibliographic information of the two related literature.

   
Content

Writing

Presentation

5 points

Thorough and succinct analysis and synopsis of the material

Tight and clear writing with succinct paragraphs and good grammar

Title of the topic

Name

Full bibliographic information of the article in good APA format

4 points

Good analysis and synopsis of the material

Wordy and coherent writing with unclear organization

Missing title

Missing name

Full bibliographic information

3 points

Cursory analysis and synopsis of the material

Coherent but  awkward sentences

Title and names are intact without full bibliographic information

2 points

Incomplete analysis and synopsis of the material

Coherent writing with grammatical problems

Misplaced bibliographic information. E.g., as references instead of at the head of each article description

1 point

Lacking clear reading and understanding of the material

Incoherent and unclear wiring with grammatical errors

None of the above

Securing Digital Government

The below rubric is what is asked to be followed during the completion of the paper:

Introduction or Overview of Digital Government

Provided an excellent introduction or overview of digital government which provided definitions and addressed the laws, regulations, and policies which require that federal agencies provide information and services via the Web. The overview appropriately used information from 3 or more authoritative sources.

Review of Digital Government Websites

Provided an excellent overview of the information and services provided by three or more digital government Websites. Provided full, complete, and concise answers to the following questions:
a. What types of information or services are available via the selected Websites?
b. What populations do these Websites serve (who is the intended audience)?
c. What sensitivity level should be assigned to each of the Websites (use FIPS 199 criteria)?
d. What security issues were observed during the review?
Appropriately used information from 3 or more authoritative sources.

Web Application Architectures and Security Issues

Provided an excellent discussion of Web application architectures and common / frequent security issues inherent in the use of Web applications in the context of digital government Websites. Discussion included 5 or more examples of security issues and addressed how these issues contribute to increased risk. Appropriately used information from 3 or more authoritative sources.

Best Practices and Recommendations for Ensuring Security of Digital Government Websites

Provided an excellent discussion of best practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Included 5 or more best practices (with recommendations) which could be implemented to improve the security of digital government websites. Appropriately used information from 3 or more authoritative sources including NIST’s Cybersecurity Framework and NIST SP 800-53.

Summary of Research and Recommendations

Provided an excellent summary of the research and recommendations for this deliverable. Summary was clear, concise, and accurate. Appropriately used information from authoritative sources.

Addressed security issues using standard cybersecurity terminology

Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of security issues. Appropriately used 5 or more standard terms.

Professionalism Part 1: Consistent Use and Formatting for Citations and Reference List

Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. Reference list entries and in-text citations are consistently and correctly formatted using an appropriate citation style (APA, MLA, etc.).

Professionalism Part 2: Organization & Appearance

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Professionalism Part 3: Execution

No formatting, grammar, spelling, or punctuation errors.