Discuss your opinion of the Zimbardo experiment. Why do you believe that the men who took the role as prison guards became overtly authoritarian? Why do you believe the men who took the role of prisoners became emotionally imbalanced? If you were a prison warden, what changes would you make to prevent these types of occurrences from happening?
Category: Law
Discuss your opinion of the Zimbardo experiment. Why do you believe that the men who took the role as prison guards became overtly authoritarian? Why do you believe the men who took the role of prisoners became emotionally imbalanced? If you were a prison
Terrorist organization on US FTO list
Part 1 – Select a domestic or international terrorist organization that threatens the U.S. homeland and complete a profile of that organization. The group profile should be approximately 50 percent of the final paper and must include a discussion of the group’s ideology, targeting, tactics, capability, and overall goals, analysis of attacks, and any statements or propaganda released by the group. Make sure you have enough information on the group to address all these factors and how it affects the US homeland.
A foreign terrorist group for this project must be on the official list of foreign terrorist organizations (FTOs) maintained by the U.S. Department of State. In the case of domestic terrorist groups, there is no sanctioned list from which to choose, but the Federal Bureau of Investigation (FBI) has made significant arrests from several groups that would fit the description of a domestic terrorist group. The FBI also names many other groups in congressional testimony. Materials presented in the first module, as well as recent news and congressional testimony, are good sources of information on how to identify domestic groups for this project.
Part 2 – Use the group profile to conduct an analysis of one or more U.S. homeland security policies studied in module 2, to assess the ability of the policy or policies to counter the threat posed by the group profiled. This analysis should begin with an introduction and explanation of the policy, followed by an analysis addressing the breadth of the information (from part 1) gathered on that terrorist group. The policy you analyze should be consistent with the group; for example, if you choose a domestic terrorist group, it would be improper to analyze the Secure Border Initiative and its ability to counter a domestic threat, because the members of the group are already within the nation’s borders. If you find the policy deficient, make specific recommendations for policy change to counter the threat. If you deem the policy sufficient to counter the threat, explain the rationale for your conclusion.
Your finished project, including both elements of the paper, should be approximately 12 to 14 double-spaced pages, not including the cover or reference pages but including the abstract, submitted as one document. Make sure you present an introduction and a conclusion tying together both aspects of the paper.
Heres some groups to choose from:
1. Islamic Revolutionary Guard Corps (IRGC)
2. Jamaat Nusrat al-Islam wal-Muslimin (JNIM)
3. ISIS-Greater Sahara
4. Al-Qaida in the Indian Subcontinent
5. Islamic State of Iraq and the Levants Branch in Libya (ISIL-Libya)
6. al-Qaida in the Arabian Peninsula (AQAP)
7. Kataib Hizballah (KH)
8. al-Shabaab
9. Boko Haram
Stakeholder paper
Stakeholder Short Paper
Write a 3- to 5-page (double spaced) paper about a particular U.S. stakeholder and their interests in energy policy. It can be a private firm, an NGO, or even a government agency (just note that government agencies are often the hardest to effectively profile, since they’re not officially allowed to lobby, and their orientation and activities tend to change based on who’s occupying the White House).
Who is your stakeholder? How big are they, and what do they do? What do you think they want from US Energy Policy? Have they spent any money to lobby on behalf of their energy interests (in other words, how you know what they want)? Have they made contributions to political campaigns? Do their interests surprise you?
Determining what your stakeholder wants can be tricky. The best place to start is to look at their website. Often your stakeholder will be pretty clear on what they want, but beware the dangers of greenwash! Virtually no website will say, “We want to weaken environmental laws so that we can make more money at the expense of society at large!” Looking at corporate websites, apparently EVERYONE is an environmentalist… It might be useful to look at what the company is actually doing, how large any clean investments are, etc. The comparison of what they say versus what they do, so to speak, is often interesting.
Make sure to include in-text citations as well as a bibliography to show your sources.
DB 7
Threads in response to the questions must reflect critical thought, relate the course content to real-world applications with biblical perspectives, and cite any sources used. The thread must be at least 250300 words. References will be provided to writer.
Question:
Why are control systems and data acquisition important? Discuss issues with securing data and systems. Research and review data breaches that have occurred in America. Which do you find most significant? What security measures could have prevented the breach?
DB 6 replies
You must post at least 2 replies to your classmates threads. The replies must be 100135 words each.
Responding to a classmates post requires both the addition of new ideas and analysis. A particular point made by the classmate must be addressed and built upon by your analysis in order to move the conversation forward. Thus, the response post is a rigorous assignment that requires you to build upon initial posts to develop deeper and more thorough discussion of the ideas introduced in the initial posts. As such, reply posts that merely affirm, restate, or unprofessionally quarrel with the previous post(s) and fail to make a valuable, substantive contribution to the discussion will receive appropriate point deductions. Original posts will be uploaded to assigned writer.
Question:
Discuss the importance of information sharing to homeland security. What progress has been made? Do barriers to information sharing exist? List any barriers, and provide considerations for minimizing these barriers.
anything pertaining to border and coastal security.
The topic for your research paper can be anything pertaining to border and coastal security. Once you have decided on a topic, develop a research question and hypothesis to support it. There is no need to submit your question and hypothesis for “approval”. A minimum of 10 outside references are required.
Paper Format:
Cover Page
Abstract (no more than 150-250 words)
Introduction (include the specific research question and hypothesis which are presented at the end)
Literature Review Critical analysis is the key here
Methodology (This needs to more than a single sentence that states “I used qualitative methods”. Take the time to explore what type of qualitative method you used. Content Analysis and Case Study are the two approaches that seem most likely for this course.
Analysis What does your research tell you? What are your conclusions??
Conclusion ensure you include what future research should cover that has not been explored.
Reference List
Technical Requirements
Your paper must be at a minimum of 10-12 pages (the Title and Reference pages do not count towards the minimum limit).
Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
Type in Times New Roman, 12 point and double space.
Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
Information Security
Please answer the following questions
1. Consider a program to display on a local retail stores website the citys current time and temperature. Who might want to attack the program? What types of harm might they want to cause? What kind of vulnerabilities might they exploit to cause harm?
Textbook:
Pfleeger, Charles P. / Pfleeger, Shari Lawrence, and Marguiles, Jonathan, (2015). Security in Computing, Fifth, Prentice Hall. ISBN 978-0-13-408504-3
Additional information located in attachment.
Cyber Security
Following APA format and using Microsoft Word, paper should be 3-4 pages long, not including the title and reference page. A minimum of three American academic peer reviewed references must be included.
Please answer the following questions:
What is cyber security and how does it affect your every day life? What methods are implemented in your home or work that offer maximum cyber awareness? If there isnt sufficient cyber awareness/security, how can you make it to where you are more secure online?
Textbook:
Pfleeger, Charles P. / Pfleeger, Shari Lawrence, and Marguiles, Jonathan, (2015). Security in Computing, Fifth, Prentice Hall. ISBN 978-0-13-408504-3
Domestic Violence
Find four Peer-reviewed articles and choose the abstract from all 4 articles from the year of 2015-2020 and Paraphrase each article only include in-text citations at the begin and at the end example
Bullinger, Carr, and Packham (2020) said blah blah ………………………………………………………………………………………………………………………………………………………………………………………………………(Bullinger et al., 2020)
Criminal Law
****The first four questions should be a min of 150 words all together****
1.What are the advantages of probation administered by the judicial branch?
2.What are the advantages of probation administered by the executive branch?
3.How much more does imprisonment cost than probation?
4.What has the Supreme Court ruled with respect to probation fees?
————————————————————————————————————————————–
1.What are the advantages of probation administered by the judicial branch?
2.What are the advantages of probation administered by the executive branch?
3.Determine which model you think is better. Explain your answer.