Intergenerational Solidarity.

As families change through time, their relationships change as well (see the 6 relationship dimensions in Figure 9.10). Think of an intergenerational family you know and describe how there have been shifts (or continuity) in the prominence of these relationship dimensions. Based on studies in this chapter, what should be emphasized to promote optimal ties, going forward?

Best Friends Forever. Think about one of your longest-term and most important friendships during your adulthood. How does it fit with the concepts discussed in this chapter? How can its success or demise be explained in these terms? Give some specific examples.

“It’s Just a Job.” You have probably heard this phrase often or even repeated it yourself. Yet work is a major focus of adult life from the 20s through retirement and beyond. Using yourself or someone else you know as a case, apply concepts from the theories and research on vocational psychology and vocational satisfaction to identify what is going well and what might need to change.

“I’m Just Stressed.” This is another phrase you have probably heard often. What does research indicate about how work and other roles (such as family roles) interact to create positive, happy states, or negative/stressed ones? Think about how factors such as affective (emotional) events on the job, self-determination and motivation, person-environment correspondence, or intrinsic and extrinsic factors might contribute to your satisfaction with life.

Cyber security breaches

Write a short case study on one of the most impactful cyber security breaches from the past 12
months. Your case study should include:
• When did the breach occur?
• Who was the target?
• Was it a threat or attack? i.e. What cyber-attack techniques were used, i.e. Man-in-theMiddle, XSS, phishing email, DDOS, Technical Hardware/Software Failures or Errors, etc.
• What was the likelihood level of this attack (i.e. what was the probability that a specific
vulnerability will be exploited)?
• What was the impact (consequences) of the breach?
• Who was responsible for the breach?
• What could have prevented or mitigated the consequences of the breach?
• Discuss the CIA model impact associated with it.

Cyber Security

Privacy is a concept that is rapidly evolving in relation to the most public of mediums, the Internet, which became even more super-charged with social networking websites. In a recent California election, one ballot measure, Proposition 8, asked voters a question on marriage. Donors to the Prop 8 campaign found that their names, addresses, and amount of contribution were masked up with Google Maps and thus rendered into a format showing the world a map image of donors’ names, street addresses, and dollar contributions. All this data is public record information already, but still quite inconvenient to access.

  1. What are the side effects of this action?
  2. Discuss any compliance or legal risks related to privacy, security or confidentiality?

President’s Homeland Security Advisor for a new administration

You are the newly appointed President’s Homeland Security Advisor for a new administration. You have spent the last 15 years as a senior non-political member (Senior Executive Service) of the Department of Homeland Security. Write a White Paper that assesses the state of national resilience as an element of homeland security. What strategies are in place, where do you believe the gaps are, and how should they be addressed? Your paper can focus on specific element if desired such as transportation, banking, energy, and even the impact of COVID on national resilience.

Issues in cybersecurity

Write at least one paragraph for each of the following:
Describe information security issues when using social media platforms.
Explain the impact social media has on individual privacy.
Discuss ethical issues in implementing information security policies and processes.
Describe the challenges of achieving confidentiality, integrity, and availability on websites.
Describe how individuals can take responsibility to protect their privacy while using online services and accounts.

Cyber Security In Health Care

As the researcher, you should approach the proposed research from a theory or set of theories that provide the backdrop for the work (researchers do not create theory; they use established theory in which to embed their work).
This section should describe how this study will relate to existing theories and discuss how the methodology being used in the study links to those theories
The theoretical framework justifies the methods you plan to use for conducting the study and presents how this research will contribute to the body of knowledge and/or practice. Further, it describes the context within which to locate the intended project and suggests why doing such a study is worthwhile.
Directions:

Review the rubric to make sure you understand the expectations of this assignment.
DSRT 837 Rubric Adapted from Doctoral Research Handbook.docx DSRT 837 Rubric Adapted from Doctoral Research Handbook.docx – Alternative Formats
Develop a 1 page (more is fine) theoretical framework for your mock dissertation topic. Consider (but do NOT directly answer) the following questions when you write your theoretical framework:
Is the theoretical foundation strong?
Are the theoretical sources apparent?
Are they appropriate for the topic?
Do they need further explanation?

Unique security threats

Write a 6page paper (deliverable length does not include the title and reference pages)

What are unique security threats posed by the use of mobile devices with enterprise networks?
What are some principal elements in a mobile device security strategy?
How have security threats changed with mobile devices?

Unique security threats

Write a 6page paper (deliverable length does not include the title and reference pages)

What are unique security threats posed by the use of mobile devices with enterprise networks?
What are some principal elements in a mobile device security strategy?
How have security threats changed with mobile devices?