Describe the procedures the company followed when it made the last distribution through dividend payments or through a stock repurchase. 
  • Post 1: Select a publicly traded company, and describe its current distribution policy.
  • Post 2: Describe the procedures the company followed when it made the last distribution through dividend payments or through a stock repurchase.
  • Post 3: Analyze how the last distribution impacted the company’s intrinsic stock price per share.
  • Post 4: Evaluate the company’s current distribution policy, i.e. discuss the advantages and disadvantages of the company’s current distribution policy.
Explain the conclusions you can draw about your own morals and values and how you believe they could influence your role as a leader.
  • In one page or less, explain how you would address the moral dilemma you selected
  • Analyze which stage of moral development is the most consistent with your response to the dilemma and explain why.
  • Summarize your personal values based on Exercise
  • Explain how your culture shapes your personal values.
  • Explain the conclusions you can draw about your own morals and values and how you believe they could influence your role as a leader.
Would this database be useful to your colleagues? Explain why or why not.

Where can you find evidence to inform your thoughts and scholarly writing? Throughout your degree program, you will use research literature to explore ideas, guide your thinking, and gain new insights. As you search the research literature, it is important to use resources that are peer-reviewed and from scholarly journals. You may already have some favorite online resources and databases that you use or have found useful in the past. For this Discussion, you explore databases available through the Walden Library.

Note:  Psych mental health nurse practitioner

To Prepare:

  • Review the information presented in the Learning Resources for using the Walden Library, searching the databases, and evaluating online resources.
  • Begin searching for a peer-reviewed article that pertains to your practice area and interests you.

********* Using proper APA formatting, cite the peer-reviewed article you selected that pertains to your practice area and is of particular interest to you and identify the database that you used to search for the article. Explain any difficulties you experienced while searching for this article. Would this database be useful to your colleagues? Explain why or why not. Would you recommend this database? Explain why or why not.

In 300–500 words, identify and describe the Risk Control Strategy adopted by the company.

Review “Guide for Applying the Risk Management Framework to Federal Information Systems,” “Managing Information Security Risk,” and online contents regarding risk management processes. During this assignment you will conduct a full risk assessment against the same corporate profile selected earlier. Based on the information obtained from previous assignments, provide a synopsis on how to manage identified risks, and describe the tools and strategies that will ensure network security.

Prerequisite: Using a vulnerability scanner obtained for the previous assignment, conduct a full scan against all servers in the domain. (This information will be used in Part 3 of the assignment.)

Use the following guidelines to create a four to five-page report.

Part 1: Prepare for Risk Management (“Establish a Framework for Managing Risk”)

  1. List the corporate requirements (i.e., standards, laws) associated with the company. Briefly explain the impact of non-compliance.
  2. Develop categories and a classification method for company information systems. List at least eight categories for various people, processes, hardware, software, and data applicable to the company. Describe the data/system classification scheme as well as the reasons for selecting it.

Part 2: Identify Risk (“Where is the Risk to My Information Assets”)

  1. List a minimum of 20 assets (data, systems, people, processes, etc.) and measure their value to the company (Low, Moderate, High, Critical) in a simple table.
  2. In one column, identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity (i.e., Business Impact Analysis).

Part 3: Assess Risk (“How Severe is the Risk to My Information Assets”)

  1. Identify, measure (quantitative and qualitative), and mitigate key information technology risks. In addition, describe each of the tasks associated with risk framing, assessment, response and monitoring. Refer to risk models (e.g., “Managing Information Security Risk”).
  2. Select the optimal risk assessment methodology based on corporate needs. Compare the advantages/disadvantages of your selected risk assessment methodology to others used in the industry.
  3. Provide a diagram of the matrix that was used to assess risk.
  4. Define for each asset the potential threats, the likelihood the threat will occur or be successful, and the impact loss the asset will have on the company (Risk Mitigation Economics). Note: This includes disasters, loss of power, employee resignations, system malfunctions, drop-in customers, etc.
  5. Using the vulnerability scan, list in a table a minimum of 15 identified threats (open vulnerabilities) to the information systems, the impact of the exploited vulnerability, and remediation steps (countermeasures) to remove or reduce either impact or likelihood from threat.

Part 4: Define Risk Appetite (“How Much Risk is Acceptable to My Organization”)

  1. Review the characteristics of a risk appetite within Chapter 6 of the course text.
  2. Establish a Risk Appetite Statement for the company.
  3. Define the Risk Tolerance of the company.

Part 5: Control Risk

  1. In 300–500 words, identify and describe the Risk Control Strategy adopted by the company. Ensure the strategy is in alignment with corporate requirements (standards, laws, frameworks, security policies, etc.) and risk appetite.

 

FYI: Corporate profile name is “Across The States Bank”.

Which steps do you recommend to the CEO of DeepTech to immediately take after the incident?

Written Assignment 3

To work on the individual assignment, conduct own research and come up with your own solution, reflecting the concepts discussed in class.

  1. Future of Work Scenario

The following scenario has been taken from
Spiekermann, S. (2015). Ethical IT innovation: A value-based system design approach. CRC Press, pp. 22-26.

Please read the scenario on the future of work carefully. A scenario is a possible set of future events. All personas in the scenario are invented and do not have similarity with real persons.

The following personas play a role in the scenario:

It is the year 2030. Stern has a really hard time waking up. “My life is a big mess,” he thinks to himself. As he turns around in his bed, he knows that his bracelet has now signaled to the coffee machine to prepare his morning café latte—a friendly nudge to get up and get going. But Stern does not feel like it at all today.
The last six months at his company United Games Corp. were pure hell for him, thanks mainly to an all-star devil named Carly, who seems to get all the honor and attention top management has to give. Shortly after Carly joined the company, she and Stern were staffed together on a new company project. As United Games recently bought a drone manufacturer, the company asked Stern and Carly to define an innovation strategy around the new technology. In fact, United Games invested in technology for small quadrocopters, flying vehicles of about half a meter in length that can be controlled by mobile phones, remote computers, and even voice commands.

Version 1, October 16, 2022 1

The conflict started when Carly suggested that they use a crowdsourcing approach to get people’s ideas on quadrocopter use cases. This idea was not in Stern’s interest because he had anticipated the acquisition and had a long-standing vision of what United Games could do to leverage the drone’s business potential. In his view, his company should ramp up the drones and sell them to police forces. In fact, Stern had a vision for how United Games could generally evolve to benefit from the highly lucrative e-government market.

The powerful virtual reality worlds United Games created were already a virtual training terrain for military and police officers. So the contacts and sales channels would be there.
The quadrocopter purchase was now an ideal opportunity for United Games to sell drones to municipalities, who would be looking to automate and replace some of their costly human interfaces anyways.

But Carly had a completely different idea. To her, United Games was a gaming company, one that brought people joy. That mission had brought her to the company in the first place. So her idea was to market drones to households. Drones could walk kids to school, look like fancy birds (colored in bright pink and blue colors!), and have builtin communication capabilities for people to control them directly through voice commands. Carly said that the timing would allow United Games to be a pioneer in the market and create a global voice-command standard for human–drone interaction. Drones could warn kids of dangerous situations and send real-time video to parents in case they wanted to see what their kids were doing. They could be sent home to fetch stuff in case the kid had forgotten something. The drones would be a bit like the owls from the Harry Potter movies but more beautiful and compliant. Stern thought the whole idea was completely girlish and ridiculous. What would his friends say if he told them over beer that he would now go into the business of turning drones into parrots? “And how do you want to resolve the incredible noise that drones are still making?” he said to Carly.

Stern’s opposition to Carly’s ideas caused their debate to turn vicious. Stern told his colleagues that Carly was a “childish bitch” who did not have the necessary mindset to work for United Games. She did not understand the corporate identity of United Games, which they had worked to define for years. “OK, I shouldn’t have used the word bitch,” Stern thought. But, in any case, he was mad after another frustrating meeting with her.

The next time he walked into the meeting room, he was greeted by her superior smile. “This lofty attitude, this untouchable arrogance,” he told his buddies over lunch. “As if I was a child.” The meeting went as bad as he had expected. But one bright spot from that meeting was that Carly suggested meeting online next time to cheer themselves up a bit. So she came to visit him in his Galactic City facilities in the Star Games VR. He spent a whole week preparing for the meeting, building a 3D simulation of what the military drones could look like and how they could be controlled, including a business case and roll-out strategy. “Anything to convince the lofty lady.” But Carly was not impressed. Instead, she invited him to her virtual Star Games residence on planet Nanoo and had a VR simulation to show him a Heidi-like girl walking through the gardens with a fantasy drone that looked like an owl.

This was enough for Stern. He just felt that no professional means would ever make Carly see reason. And so, while out on joint space flights in Star Games or meeting physically for beers, he started to tell his long-time buddies in the company how he felt. “Enough is enough,” he said, “somehow Carly should leave the company.” His buddies agreed. They also felt that Carly was pretty arrogant and a bit over the top. They needed to find some way to cut her down to size. What about sending a military-style drone to her Nanoo virtual residence while she was there? As a product manager, Stern had access to all accounts in the game and could see where avatars were dwelling in real-time. It would be a great moment for Stern, and it would be completely harmless because it would happen in the virtual world. Second, if Carly knew the game well enough, she would be able to easily defend herself.

Finally, third, they would not have the drone shoot, just hover around her house. She would not know their identities anyways. So Stern and his buddies put their plan into action, performing the attack on a Tuesday evening and having a lot of fun doing it. Afterward, they met for beers and football to cool down and celebrate their victory in the real world. But then hell started for Stern. The next day, his boss called to ask about the progress on the drone project. His boss told him that he really liked Carly’s idea of turning the drones into a nice household device. Pleasure and kids’ safety were great messages for the markets, fitting United Games’ image well.

Two days later, United Games’ human resources (HR) officer dropped by Stern’s Galactic City premises by surprise. First, he chatted about Stern’s recent attention scores. The company’s attention management platform had found that Stern’s attention span to his primary work tasks as a product manager was below average. “You seem to be interrupting yourself too often” the HR representative had said. “But what could I do?” thought Stern. There are simply too many messages, e- mails, social network requests, and so forth that would draw on his attention. So he obviously did not match the 4-minute minimum attention span that the company had set as a guideline for its employees. Employees’ attention data was openly available to the HR department and management in order to deal with people’s dwindling capability to concentrate. Then the HR manager asked for the rest of the activity logs, the encrypted part. Stern felt a bit awkward, but finally he decided that he had nothing to hide. So he handed over the secret key to his data and allowed the personnel officer and his staff to analyze his behavioral logs on Star Games as well as the logs taken in United Games’ real office space.

Encrypted work activity logging was part of United Games’ work terms and conditions for employment. In fact, the integration of activity logging into work contracts in many companies was celebrated years ago as a major achievement of the labor unions. The encrypted activity logging process came as a response to a steep rise in burnout and workplace bullying, which seriously impacted companies’ productivity and damaged people’s health, mental stability, and well-being. A compromise on the mode of surveillance was struck between unions and employers. Prior to these negotiations, employers had conducted video surveillance in a unidirectional way that undermined employees’ privacy while providing no benefits to them. As part of the new process, employee activities and conversations would be logged in all rooms as well as VR facilities and stored in an encrypted way under the full control of employees (in their personal data clouds). With this system no one, not even the CEO of the company, could view the original data. However, when a security incident

Version 1, October 16, 2022 2

happened, employees were informed and asked to share their data. In particular, though, when serious cases of burnout or bullying occurred, employees themselves could initiate a process of data analysis, handing over their secret key so that a designated representative could recover their data, text, and voice streams, and perform a conflict analysis. Data-mining technology would then look for patterns of behavior typical for mobbing or burnout as well as cognitive and emotional states. The streams could also be used to replay specific situations in which conflict had occurred. However, these replays would occur only in the presence of a trained coach or mediator. This practice had not only reduced bullying in recent years but also helped employees to better understand their own communication patterns and behavior. Finally, the encrypted data was also used to extract aggregated heat maps of the company’s general emotional state. This practice helped upper management to better grasp the true emotional “state of their corporate nation.”

Carly had handed in her secret key and initiated an inquiry into the attack on her Nanoo home. So this was what Stern was to confront today. “Perhaps I have gone a bit too far,” he wondered. “But it is something totally normal for the Star Games anyway.” After all, the idea of the drone attack had come from another colleague of his.
Stern slowly walks up to the kitchen. His café latte is not as hot he likes it, and the machine has not put as much caffeine as usual into his cup due to his raised emotional arousal. But never mind. He turns on his Roomba vacuum cleaner, which always cheers him up in the morning by roving around the apartment making some funny sounds, just like a maybug in the virtual world would do. “Perhaps a girlish drone owl isn’t that bad after all,” he thinks. “For sure, I need to offer something to end the war now, anyways.”

  1. Create a mindmap of the ethical values touched by the attention management platform of United Games. As part of the mindmap, mark in keywords why these values are affected.
  2. Aligned with the ethical values you have identified propose alternative ways (organisational or technical) to support employees of United Games with focusing on their work. (minimum 250 words)
  1. Cybercrime Case

You are working as a security manager for “DeepTech”, a tech-company that develops AI algorithms to match freelancers with companies looking for bright talents. Recently, employees in the sales department of DeepTech received the following e-mail:

From: UPS <delivery@ups.com>
To: Peter Woodstone <p.woodstone@deeptech.com> Subject: Your parcel delivery

Dear Mr. Woodstone!
Your parcel with sender number 345624889 will be delivered today. Click here to track the status of delivery: Go to status tracking

Thank you and best regards, Dunkan Miller
UPS Account Manager

  1. Develop a structured plan of measures (table format) to protect DeepTech from potential damage in relation to such e-mails.

Unfortunately, despite your plan of measures, one of the DeepTech sales employees has clicked the link in the email and compromised login credentials to DeepTech’s internal system. DeepTech’s biggest business secrets on the newest deep learning technologies are at risk.

  1. Which steps do you recommend to the CEO of DeepTech to immediately take after the incident? (min. 300 words)

 

Provide a detailed explanation to your supervisor of how the results address the concern.

Week 9 Assignment Template

Making Data-Driven Decisions (150 Points)

Name:

Title of Presentation:

Write a two to three (2–3) page report in which you:

 

  1. Construct a box-and-whisker plot for the provided data set. Copy each of the values needed to construct a box-and-whisker plot from the Excel worksheet provided and enter those numbers below.

 

 

Minimum Maximum Quartile 1

(Median of first half of the data set)

 

Quartile 2

(Median of data set)

Quartile 3

(Median of second half of the data set)

         

 

Create the box-and-whisker plot in Excel and include a screen shot of the box-and-whisker plot below.

 

 

 

 

 

 

 

  1. Copy the sample mean, median, and standard deviation from the provided Excel Worksheet and enter those below.
Mean Median Standard Deviation
     

 

 

  1. Copy the 95% Confidence Interval from the Excel Worksheet provided and enter that below.
Lower Limit Upper Limit
   

 

 

 

  1. Use the results from the hypothesis test in the Excel worksheet provided to fill in the table below. Clearly state the logic of your test, the calculations, and the conclusion of your test.
Null Hypothesis (  
Alternative Hypothesis (  
What type of Test Statistic did you use and why?  
Value of Test Statistic  
P-value  
Critical Value  
Conclusion: Is the claim supported? Why or why not?  

 

 

 

  1. Evaluate the results of the hypothesis test and communicate the suggested solutions based on those results. (This section should be 1–2 pages). Provide the following discussion based on the conclusion of your test:

 

  1. Provide a detailed explanation to your supervisor of how the results address the concern.
  2. What is your suggested solution based on the results?
  3. What decisions should be made based on the results? What should the next steps be?

 

discuss influences on your intellectual development, educational and cultural opportunities (or lack of them) which have been available to you, and the ways in which these experiences have affected you.

500-word maximum statement of purpose:

Please include a brief narrative describing

  • Yourself (Mexican)

 

One of my proudest life achievements was obtaining my university degree, even though my early adulthood pointed in the opposite direction, being a young wife, and having my first child at the age of 20. Since then, I dedicated myself to my family, and my education was put aside. However, in 2013 I was finally able to enroll into college in 2018 I transferred to the University. Although it took me six years to complete my bachelor’s degree in Sociology and Social Service, I wanted to further my education by continuing with my master’s degree focusing on mental health.

 

 

  • career goals and the importance of graduate study in clinical mental health counseling at this point in your life. 

 

  • Include relevant volunteer or professional experiences that you feel have prepared you for this profession. 

 

Volunteer at adult school district as a mentor and recently working as a communicative disease investigator, interviewing, and listening to covid patients.

 

  • You may discuss influences on your intellectual development, educational and cultural opportunities (or lack of them) which have been available to you, and the ways in which these experiences have affected you.

This should not be a recording of facts already listed on the application; it should give the Admissions Committee a better sense of who you are and why you are applying to the clinical mental health counseling specialization at the University

 

Describe whether your research hypothesis was supported from the hypothetical data.

PSY 510 SPSS Assignment 4

 

Before you begin the assignment:

 

  • Review the video tutorial in the Module Eight resources for an overview of comparing means in SPSS.
  • Download and open the Food Consumption SPSS data set.

 

An overview of the data set:

 

This data set presents the results of a hypothetical experiment that examined dieting, food consumption, and mood. In the first session of the experiment, a sample of dieters and non-dieters were given a plate of food from a popular restaurant. The amount of food (in ounces) that they consumed was measured. In addition, their mood was measured. One week later, the same participants were tested again. This time, while they were eating their plate of food, they also watched a funny movie. Researchers again measured food consumption and mood, as well as participants’ feelings about their body and self-esteem. Specifically, the following variables are included:

 

  • Subnum: This is the ID number given to track each participant in the experiment.
  • Dietingstatus: This identifies whether or not the participant self-identified as a dieter. If the participant was not dieting, he or she was coded as a “1”, and if the participant was dieting, he or she was coded as a “2”.
  • Consumption1: The amount of food (in ounces) eaten at time 1.
  • Consumption2: The amount of food (in ounces) eaten at time 2.
  • Mood1: Participants’ mood at time 1. Scale ranged from 1 (negative mood) to 10 (positive mood).
  • Mood2: Participants’ mood at time 2. Scale ranged from 1 (negative mood) to 10 (positive mood).
  • Bodyimage: Participants’ self-reported body satisfaction. Scale ranged from 25 (dissatisfied) to 50 (satisfied).
  • Selfesteem: Participants’ self-esteem rating. Scale ranged from 15 (low self-esteem) to 30 (high self-esteem).

 

Questions:

 

1a) Use the Compare Means function to examine the means for dieters and non-dieters on the Body Image and Self Esteem variables.

 

Paste relevant output below:

 

1b) Describe the differences in means that you see.

 

Type your answer below:

 

2a) Conduct independet samples t-tests to see if the differences noted above are significant. In other words, conduct two independent samples t-tests, one examining the relationship between Dieting Status and Body Image and one examining the relationship between Dieting Status and Self-Esteem.

 

Paste your relevant output below (Read carefully: The best way to do this is to select “Copy Special” when copying from the SPSS output. Then select image as a format to copy. When pasting in Word, select Paste Special, choose a picture format, and then resize the image so it fits the screen):

 

2b) Use the Sig. (2-tailed) column to find the p-values for each test. Based on these p-values, are either of the tests significant? How do you know? Based on the significance of the tests, what would you conclude about te relationship between dieting and body image and the relationship between dieting and self-esteem?

 

Type your answer below:

 

3a) Use SPSSto calculate the means for Consumption1, Consumption2, Mood1, and Mood2.

 

Paste your relevant output below:

 

3b) From th means, describe how scores on Consumption and Mood changed from Time 1 to Time 2.

 

Type your answer below:

 

3c) Conduct dependent samples t-tests on the Consumption variables and the Mood variables. In other words, you need to conduct two separate dependent samples t-tests.

 

Paste your relevant output below (use the same copy/paste technique as in 2a):

 

3d) Use he Sig. (2-tailed) column to find the p-values for each test. Based on these p-values, are either of the tests significant? How do you know? Based on the significance of the tests, what would you conclude about the changes in consumption and mood?

 

Type your answer below:

 

4a) Describe a research hypothesis (unrelated to the Food Consumption dataset) that could be assessed using a dependnt samples t-test. Be sure to describe your variables.

 

Type your answer below:

 

4b) Enter hypohetical data relevant to your research hypothesis for at least 10 participants. Then, conduct a dependent samples t-test on the data in SPSS.

 

Paste relevant output below:

 

4c) Describe whether your research hypothesis was supported from the hypothetical data. Be sure to incorporate statistical significance into your answer.

 

Type your answer below: