Critically explore how learners learn in a particular knowledge area
Assignment theme:  Critically explore how learners learn in a particular knowledge area

 

Part 1 Introduction (approx. 500 words)

This section should include

·         An overview of the aims of Language education from the PoS for example.

·         (History of Primary Languages)

•       Looking at aim of stories in more detail (what does the literature say)

•       Overview of what you are going to address

Part 2 (1500 words)

Literature Review

•       Overview of Learning Theory

•       Considering Learning Theories and teaching methods when teaching languages

•       Review the theories in a critical light

 

 

Part 3 (750 words)

Focus of Knowledge Area

•       Discuss the knowledge area you have chosen and why they have chosen it (why it is important) (e.g. target language, grammar, assessment, progression, intercultural understanding) linked to the literature you have read

 

 Part 4 (1500 words)

Reflections upon your own teaching the story, relating the method theories

•       The reflections of teaching methods in PMFL

•       Reviewing your story and planning in the light of this.

•       (You can annotate a lesson plan if that is helpful)

 

Your reflections could include:

• how you interpreted the area in your own planning

• how you assessed their learning and provided feedback

Conclusion (500 words)

You conclude with considering

• how this process helped you in understanding how to plan in the knowledge area including any interesting issues you confronted and your implications for the future

Compare and contrast juvenile delinquency prevention and treatment.

Description
Research Paper – Juvenile Delinquency Prevention and Treatment
Compare and contrast juvenile delinquency prevention and treatment. The paper should address the
following:
a description of delinquency prevention, the fundamental principles of prevention, examples of the types of
prevention that have been used, and an analysis of the effectiveness of the prevention (successes and/or
failures)
a description of delinquency treatment, the fundamental principles of treatment, examples of the types of
treatment that have been used, and an analysis of the effectiveness of those treatment programs (successes
and/or failures)
a discussion of which aspects of prevention and treatment are similar, and which are different
an explanation of the overall importance of prevention and treatment—why are both critically necessary
components of the juvenile justice system, and to what extent are they interrelated?
Format Requirements
Paper must be double spaced, 11 or 12 pt font and 1” margins all around.
All APA 7th edition format requirements must be followed (cover page, in text citations, reference page).
Refer to APA/UMGC – learning resources found in the content page of this course.
You must have resources to support your thoughts/opinions/information. These must be cited both in text as
well as at the end of the document. Your paper should not contain direct quotes, sourced material must be
paraphrased.

Write a discussion explaining which approach you prefer for weighted average cost of capital (WACC) for your assigned corporation, Target, one using the Cost of Equity RE from the security market line (SML)

Description
Write a discussion explaining which approach you prefer for weighted average cost of capital (WACC) for
your assigned corporation, Target, one using the Cost of Equity RE from the security market line (SML)
Approach or another WACC the Dividend Growth Model Approach for Cost of Equity RE. and why.

Do you think we should close juvenile prisons? If so, what alternatives would you recommend?

Description
Do you think we should close juvenile prisons? If so, what alternatives would you recommend?
Do you agree with the U.S. Supreme Court decision that juveniles 17 or under should not be sentenced to
life?
Juveniles constitute 1,200 of the 1.5 million people housed in federal and state prisons in this country, and
nearly 200,000 youth enter the adult criminal-justice system each year, most for non-violent crimes, do you
agree this is an effective practice in reducing juvenile crime and rehabilitating them?

Compare and contrast the regulation of the bid process and takeover defence regulation in the UK and the US and critically evaluate which jurisdiction is most likely to provide greater material protection to shareholder value from the misaligned interests of directors.

Essay title and requirements

 

Answer the following Question:

 

Compare and contrast the regulation of the bid process and takeover defence regulation in the UK and the US and critically evaluate which jurisdiction is most likely to provide greater material protection to shareholder value from the misaligned interests of directors.

 

 

 

Total Word Limit:                                3,000 words

(excluding footnotes and appendices, bibliography, contents, tables of cases and title pages)

 

Referencing style: OSCOLA (footnote and bibliography)

 

Course name: MERGERS AND ACQUISITIONS

 

 

Guideline from lecturer:

I have set out below some basic good practice for the summative essay question.

 

First, the golden rule for citation of legal authorities is that you use the OSCOLA system of referencing for the main UK primary legal sources, and for the main types of secondary sources. Obviously, the rules and examples in OSCOLA are based on common practice in UK citation. When citing US case law, the exact format of a case citation depends on several factors (e.g. jurisdiction, court, and type of case), but the basic format of a case citation is as follows: [Case Name], [Volume No.] [Reporter Abbreviation] [1st Page of Case], [“Pinpoint” page/page referred] [Court] [Year] – e.g. Am. Geophysical Union v. Texaco, Inc., 60 F.3d 913, 915 (2d Cir. 1994).

 

Second, the essay title requires you to adopt an analytical frame rather than merely explain the law relating to takeovers in the UK and US. You must be able to apply the knowledge and understanding of selected module topics that are particularly relevant to the question proposition. In doing so, the answer provided must critically evaluate the relevant legal rules and/or academic opinions drawn from a range of disciplines and to adopt and defend a reasoned position on the issues explored.

 

Third, because the essay forms 100% of your assessment for this module, I am limited to providing a general advisory note about the question content and its interpretation. The note is as follows. First, the question is a comparative one, and you decide how to structure the comparison. You might choose to e.g. separate the question into two parts where the UK and US law are addressed in turn, or focus primarily on one jurisdiction but to then situate the analysis of the second system within that discussion – or something different. The choice of essay structure is one for you to determine, and the coherence of presentation forms part of the overall mark. Second, primary focus of analysis is expected to centre on the appropriate form of agency – i.e. shareholders/UK system or directors/the Delaware approach – to achieve shareholder value in a takeover situation. Are shareholders better off if directors/managers are given some insulation from unsolicited bids and therefore better able to pursue capital-intensive strategies designed to generate optimal financial returns? Or are they be better served by a system that enables changes of corporate control to easily replace management if management is not following shareholder sentiment regarding the company’s value?

 

This is the extent of the guidance that can be provided to you regarding the summative essay title. I hope it is helpful to you and I wish you all the best and good luck in completing the assessment.

 

 

 

Some important reading materialsreferencesneed to be considered/ included:

 

  • D. Kershaw, Principles of Takeover Regulation (2016, OUP).

https://oxford.universitypressscholarship.com/view/10.1093/oso/9780199659555.001.0001/isbn-9780199659555-index-group-1-index-1

 

  • S. M. Bainbridge, Mergers and Acquisitions 4th edn., (Foundation Press, 2021) (the third edition of this book remains valuable and can be used if necessary).

 

Henry G. Manne, “Mergers and the Market for Corporate Control,” (1965) 73 Journal of Political Economy 110-120.

 

Julian Franks & Colin Mayer, “Hostile Takeovers and the Correction of Managerial Failure,” (1996) 40 Journal of Financial Economics 163-181.

 

Have We Learned and Where Do We Stand?,” (2008) 32 Journal of Finance 2148-2177.

 

Richard  A.  Brealy,  Stewart  C.  Myer  &  Franklin  Allen,  Principles  of  Corporate Finance (McGraw Hill 10th ed. 2019), Part 10.

https://r3.vlereader.com/Reader?ean=9781260568356#

 

John Armour and David Skeel, Jr. ‘Who Writes the Rules for Hostile Takeovers, and Why? – The Peculiar Divergence of US and UK Takeover Regulation’ (2007) 96 Geo. L. J. 1727.

 

John C. Coates IV, “Mergers, Acquisitions, and Restructuring: Types, Regulation and Patterns of Practice,” available at http://www.law.harvard.edu/programs/olin_center/papers/pdf/Coates_781.pdf.

 

Jonathan Mukwiri,  Takeovers  and  the  European  Legal  Framework:  A  British Perspective, Ch. 1.

 

Brian E. Rosenzweig, “Public Versus Public Regulation: A Comparative Analysis of British and American Takeover Controls,” Duke Journal of Comparative and International Law 18 (2007) 213-237.

 

  1. Davies, ‘The Notion of Equality in European Takeover Regulation’ (2002) SSRN Research Paper, < https://papers.ssrn.com/sol3/papers.cfm?abstract_id=305979>

 

R v. Panel on Takeovers and Mergers, ex parte Guinness plc [1990] 1 QB 145, Court of Appeal.

 

R v. Panel on Takeovers and Mergers ex parte Datafin plc [1987] 1 All ER 564, [1987] QB 815, Court of Appeal.

 

Companies Act 2006, Part 28.

The Takeover Code, available at:

https://www.thetakeoverpanel.org.uk/wp-content/uploads/2021/08/567845_005_The-Take-Over_Bookmarked_02.08.21.pdf?v=28Jun2021.

 

EU Takeover Directive 2004/25/EC.

 

Andrew Johnston, “Takeover Regulation: Historical and Theoretical Perspectives on the City Code,” Cambridge Law Journal 66(2) (2007) 422-460.

 

  1. Kershaw, ‘The Illusion of Importance: Reconsidering the UK’s Takeover Defence Prohibition’ (2007) 56 International and Comparative Law Quarterly 1-40.

 

  1. Davies, E. Schuster, E. van de Walle de Ghelcke, ‘The Takeover Directive as a Protectionist Tool?’ (2010) ECGI Law Working Paper No. 141/2010.

 

  1. Lipton, ‘Management and Control of the Modern Business Corporation: Corporate Control Transactions’ (2002) 69 University of Chicago Law Review 1037.

 

  1. Tsagas, ‘Use and Abuse of Power Changes of Corporate Control: Transfer Schemes and Shareholders’ Voting Practices in Unchartered Waters’ (2019) 4 JBL 282-303.

 

Jennifer Payne, “Schemes  of  Arrangement,  Takeovers  and  Minority  Shareholder Protection,” (2011) 11(1) Journal of Corporate Law Studies 67-97.

Gower & Davies, Ch. 29.

 

Lexis PSL Corporate, “Takeover Offers v. Schemes of Arrangement – Key

Advantages and Disadvantages – Comparative Table.

 

Lexis PSL Corporate, Schemes of Arrangement – Application of the Takeover Code. Lexis PSL Corporate, Offers and Schemes of Arrangement – A Comparision.

 

  1. M. Lafferty, L. A. Schmidt, and D. J. Wolfe, Jr., ‘A Brief Introduction to the Fiduciary Duties Under Delaware Law’ (2012) 116 Penn State Law Review 837.

 

  1. Bainbridge, ‘Exclusive Merger Agreements and Lock-Ups in Negotiated Corporate Acquisitions’ (1990) 75 Minnesota Law Review 239.

 

  1. B. Thompson, ‘Exit, Liquidity, and Majority Rules: Appraisal’s Role in Corporate Law’ (1995) 84 Georgetown Law Journal 1.

 

  1. F. Greene, ‘Corporate Freeze-Out Mergers: A Proposed Analysis’ (1976) 28(3) Stanford Law Review 487.

 

Richard S. Ruback, ‘An Overview of Takeover Defenses’ (available at: http://www.nber.org/chapters/c5821.pdf

 

  1. Kahan and E. Rock, ‘How I learned to Stop Worrying and Love the Pill: Adaptive Responses to Takeover Law’ (2002) 69 University of Chicago Law Review 871.

 

  1. T. Allen, J. B, Jacobs, and L. E. Strine, Jr., ‘The Great Takeover Debate: A Mediation on Bridging the Conceptual Divide’ (2002) 69 University of Chicago Law Review 1067.

 

  1. Subramanian, ‘Bargaining in the Shadow of Takeover Defences’ (2003) 113 Yale Law Journal 621.

 

  1. Bebchuk, ‘The Case for Increasing Shareholder Power’ (2005) 118 Harvard Law Review 833.

 

If you need any reading materials, do not hesitate to contact me, I could provide e-resources as you wish.

What theories can help explain and help solve the problems in this neighborhood?

Required Article Readings

  • Weisburd and Piquero (2008)-How Well Do Criminologists Explain Crime? (UO6.1-UO6.3)
  • Lavrakas (1995)-Community-Based Crime Prevention (UO6.4)
  • Stone (1995)-The Criminal Justice System: Unfair and Ineffective (UO6.4)
  • “Some things to think about…” Document (UO6.1-UO6.5)

 

Recommended Materials

 

 

Discussion Board Instructions:

You are an urban criminologist in the City of Chicago, hired by the Mayor to help develop policies to reduce crime. Chicago is a very large city with a diverse population of almost 3 million people. There are large inner-city neighborhoods that suffer from lack of community structure, poverty, and hopelessness. Buildings are decayed, businesses have fled, unemployment is high, and resources are low. Predatory delinquent gangs run free, terrorizing local merchants and citizens. The school system has failed to provide opportunities and educational experiences sufficient to dampen enthusiasm for gang recruitment. One of the biggest problems has been the large housing projects built in the 1960s. These are now overcrowded and deteriorated. Police are actually afraid to enter the buildings unless they arrive with a SWAT team. Each building is controlled by a gang whose members demand tribute from the residents.

Your goal is to develop a policy proposal to revitalize the area, help address the gang problem, and eventually bring down the crime rate.

Consider the following:

  • What theories can help explain and help solve the problems in this neighborhood?
  • How do population demographics (such as age, race/ethnicity, and gender, which are correlates of crime) affect your policy suggestions?
  • How can unemployment be decreased?
  • How can the gangs be addressed?
  • What role will the public play, and what roll with the criminal justice system play, in reducing these problems?

One of the most important elements of a theory is that it have real-world policy implications.

Be sure you use examples and support explanations from the Required Article Readings and Recommended Materials.

 

 

Carry out the penetration testing activities which are necessary to prove AT LEAST HALF of the vulnerabilities that have been identified for each of the SFRs

Section 1: Overview of the target of evaluation (TOE)

XYZ is an online retail company which has developed an online store called Juice Shop. XYZ is
planning to request Common Criteria certification for Juice Shop. Juice shop’s documentation can also be found at Architecture overview · Pwning OWASP Juice Shop (owasp-juice.shop).

The Juice Shop system includes

  • A Frontend subsystem involving a pure web application implemented in JavaScript and TypeScript (which is compiled into regular JavaScript). In the frontend the popular Angularframework is used to create a so-called Single Page Application. The user interface layout is implementing Google’s Material Design using Angular Material It uses Angular Flex-Layout to achieve responsiveness. All icons found in the UI are originating from the Font Awesome library.
  • A Backend subsystem implemented primarily in JavaScript that involves anExpress application hosted in a js server delivers the client-side code to the browser. It also provides the necessary backend functionality to the client via a RESTful API. As an underlying database a light-weight SQLite was chosen, because of its file-based nature. This makes the database easy to create from scratch programmatically without the need for a dedicated server. Sequelize and finale-rest are used as an abstraction layer from the database. This allows using dynamically created API endpoints for simple interactions (i.e. CRUD operations) with database resources while still allowing the execution of custom SQL for more complex queries.
  • An additional data store, a MarsDB. It is a JavaScript derivative of the widely used MongoDBNoSQL database and compatible with most of its query/modify operations.
  • The push notifications that are shown when a challenge was successfully hacked, are implemented via WebSocket Protocol. The application also offers convenient user registration via OAuth 2.0so users can sign in with their Google accounts.

The following diagram shows the high-level communication paths between the client, server and data layers:

 

Additional details on the components can be found below.

Frontend
The frontend consists of the following elements:

  • A set of Services, each responsible to handle specific RESTful HTTP calls to the backend
  • A set of Components, each responsible for one screen portion of the application (e.g., contract
    form, basket)
  • A set of Templates, working with components to display graphical content to the user

The frontend supports 2 types of users:

  • Users, who interact with the web store and perform actions within their access rights (e.g., login,
    buy a new product, write a complaint)
  • Administrators, who are responsible for the maintenance of the web store.

Backend
The backend of the system is separated into two layers: Server layer and the Storage layer:

  • The Server layer that consists of three components, namely:
    • REST API endpoints to support CRUD operations for the database models
    • A custom set of middleware components that are used to enable the business logic
      (e.g., ordering a product) and access control (e.g., check if user is authorized to
      make an order)
    • A security component responsible for various security-relevant utilities (e.g.,
      captcha verification)
  • The Storage layer that consists of three components, namely:
    • A SQL database that stores
      • Business data (e.g., the products of the store)
      • User data (e.g., usernames)
      • Security data (e.g., security questions)
      • Metadata (e.g., database schema definition)
      • Operational data (e.g., configuration files)
      • Development data (e.g., custom queries and functions)
    • A No-SQL database that stores
      • Feedback data for the products (e.g., reviews placed by the users)
    • The filesystem that stores
      • Business related files (e.g., order confirmation, complaint reports

IT Environment
The IT environment in which the backend of the webstore resides is Linux based (Ubuntu) and
supports 2 types of users (this refers to the provided Virtual Machine, but the IT environment depends entirely on your deployment approach):

  • Web Application user (i.e., a user with limited permissions that is allowed to execute the web-
    store related files)
  • Root user (i.e., a user with all permissions enabled that is responsible for the maintenance of the
    IT environment)

 

Beyond the above description, you should also examine the comprehensive codebase explanation in the following link Codebase 101 · Pwning OWASP Juice Shop (owasp-juice.shop).

Section 2: Your Task

Your task in this part of the coursework will be to evaluate the satisfaction (or otherwise) of the TOE system that is described in Section 1 above against the following security functional requirements (SFRs) of the Common Criteria certification framework:

 

  • 1.1 The TSF shall enforce the systems access control SFP on all subjects, all objects, and all operations among subjects and objects covered by the SFP.
  • 2.2 The TSF shall ensure that all operations between any subject controlled by the TSF, and any object controlled by the TSF are covered by an access control SFP.
  • 1.2 The TSF shall require each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user.
  • 3.1 The TSF shall prevent use of authentication data that has been forged by any user of the TSF.
  • 3.2 The TSF shall prevent use of authentication data that has been copied from any other user of the TSF.
  • 1.1 The TSF shall enforce the access control SFP(s), to restrict the ability to change, and delete the security attributes username and user password to admin users.
  • 1.1 The TSF shall restrict the ability to reset user passwords to root and admin users.
  • 3.1 The TSF shall be able to maintain an internal representation of the following signature events EVENT1, EVENT2, …, EVENTn that may indicate a violation of the enforcement of the SFRs.
  • 3.3 The TSF shall be able to indicate a potential violation of the enforcement of the SFRs when a system event is found to match a signature event that indicates a potential violation of the enforcement of the SFRs.
  • 1.2 The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed:
  • no user other than the user who created data stored within the system can delete or modify them
  • no user can create data associated with another user
  • 1.3 The TSF shall explicitly authorise access of subjects to objects based on the following additional rules:
  • only a user with root rights can register another user as an admin user
  • 1.4 The TSF shall explicitly deny access of subjects to objects based on the following additional rules:
  • no normal or admin user can register himself/herself or another user as an admin user
  • 2.2 Upon detection of a data integrity error, the TSF shall decline any operation related to the particular piece of data.

To assess the above SFRs, you should

  • Identify which of the vulnerability challenges of the Juicy Shop system that have been described in[1] are relevant to the satisfaction/violation of each SFR
  • Carry out the penetration testing activities which are necessary to prove AT LEAST HALF of the vulnerabilities that have been identified for each of the SFRs
  • Record the evidence generated whilst carrying out penetration testing for each vulnerability
  • Provide a rationale of how exactly the evidence accumulated for (3) indicates the violation of the SFR that is associated with the relevant vulnerability challenge in (1)

More specifically, your submission should be structured as follows:

SFR Identifier: SFRi

Related vulnerability challenges: VC1, VC2, …, VCn

Tested Vulnerability Challenges:

VCj

  • Description of penetration testing that was carried out for VCj
  • Outcomes (evidence) of the penetration testing in (a)
  • Explanation of how the evidence included in (b) proves that SFRi is violated

VCj+1

  • Description of penetration testing that was carried out for VCj+1
  • Outcomes (evidence) of the penetration testing in (a)
  • Explanation of how the evidence included in (b) proves that SFRi is violated

etc.

 

Section 3: Tools that you will needed

Lab Deployment

The system that you are going to assess is publicly available on the following repository and it offers various deployment options (check the setup section of the repository).

Repository: https://github.com/juice-shop/juice-shop

In addition to the provided options we created an alternative way that might be more convenient for some; its ready out of the box image usable on most popular hypervisors (Virtualbox, VMware, Parallels etc.), you may download the virtual machine (.ova file) from the following link (make sure you access the link with your city email, otherwise it will not work).

  • To deploy the image in VirtualBox, follow the instructions on this link.
  • To deploy the image in VMware Player, follow the instructions on this link.
  • To deploy the image in M1 Mac OS, its better to use one of the proposed deployments offered by OWASP on this link, but you can also try to use UTM to deploy a Linux distribution of your choice, then there you can try deploying the virtual machine or the container.

Security Tools

For the investigator machine you can use either a container or a virtual machine, Offensive Security offers their Linux Distribution (i.e., Kali Linux) in any format you are likely to need it (including M1 support), check the following link. The default images contain all the necessary tools you have practiced on the tutorials.  For instructions, examples, and documentation on how to use the tools, you should consult Tutorials 6 (Nmap) and Tutorial 7 (ZAP).

Additional deployment notes

Make sure your Investigator system and the Web Shop system are on the same network. There are 3 basic cases for that.

  • You have 2 virtual machines for both systems
    • Both must have a bridged network adapter, or host-only or to be connected to the same custom network
  • You have 2 containers for both systems
    • Both must be part of the same network. You can use the tutorial 1 or 2 docker-compose files if you want to use a docker-compose. If you use regular docker make sure both are connected to the same network. One way is the following
      • docker network create network_name
      • docker connect network_name investigator_container_name
      • docker connect network_name web_shop_container_name
    • You have 1 virtual machine and 1 container (either the investigator/web-shop)
      • Make sure that the virtual machine is on a bridged or host-only network
      • The container should be able to communicate with it with no further configuration.

[1] PART II of https://pwning.owasp-juice.shop

Do hurdles to successful negligence claims lie at the level of a particular element of negligence, of the interaction between the elements, or in establishing defences such as volenti or illegality? Critically Discuss.

Candidates must present answers to ONE question from Section A, and ONE question from Section B.
The total word limit for the Coursework, containing both sections, is 3,500 words. The expected word
range for the Coursework is 2,800-3,500 words.
Section A
1 Peter was cycling to Lanchesterford University for a lecture at 3pm. He had been on the
phone to his mother and was late, so had not bothered to accept his housemate’s offer of
their bike helmet, but was being careful on the roads and kept to the cycle paths where
these were available.
Daniella was also late as she drove out towards the university for a meeting at 3pm. She
was distracted by an item on the 2.30pm news about an explosion in a house on her
grandfather’s street in a village near Lanchesterford. She braked suddenly and pulled out
sharply onto the main road. Peter swerved, lost control of his bike and fell awkwardly onto
a tree stump on the grass verge at the side of the road. Daniella stopped to check if Peter
was okay. He said he was, but that he would walk to the Accident and Emergency
Department at the hospital in the next street just in case.
At the hospital, Peter informed the receptionist that he had fallen off his bike and that he
had head pain. There were not many people in the waiting area, and the receptionist told
Peter that he would have to wait at least 4 hours to be seen but, if he collapsed, he would
be treated as an emergency.
Peter waited 17 minutes, then decided to go home so he could take some paracetamol
and lie down. He left the hospital without informing anyone. Later that day, Peter did
collapse and was taken back to the hospital in an ambulance, which was summoned
promptly and arrived within the expected time. During the journey to the hospital, Peter
suffered a traumatic brain injury. He was transferred for surgery on arrival but suffered
brain damage and was unable to complete his law studies.
After her meeting, Daniella checked her phone for updates on the explosion, which was
linked to work on the gas pipes being undertaken by the local energy company. She saw
images of two houses which had collapsed, and recognised her grandfather’s car covered
in debris. At 5pm, she received a phone call from her mother, telling her that her
grandfather had died as a result of the explosion. Daniella, who had been raised by her
mother and grandfather, went on to suffer clinical depression as a result of this and was
unable to work.
Advise Peter and Daniella on any potential claims in tort and remedies.

Kara bought a large country home 20 years ago with a garden for her expensive show
roses. Over the past 10 years, factories have gradually expanded into the area. Ironworks
Ltd had most recently built near Kara’s home. To process their products, Ironworks Ltd
has lorry deliveries using the public road that Kara and Larry, Kara’s neighbour, live on.
These deliveries sometimes occur late at night and have recently started to splash hot
liquid onto Kara’s property, damaging her roses. Fumes from the factory also spill onto
Kara’s garden, making it difficult for her to enjoy her roses outside due to the smell. She
has also noticed significant wilting in the roses from the chemical fumes.
Larry has also complained that his sleep at night has been disrupted by the lorries,
although he has not had the same problems with fumes and property damage.
Ironworks Ltd claims they are doing no wrong as they received planning permission to
build, and they abide by industry standards for factories of this type.
Lastly, the Ministry of Defence has decided to reopen an air base that has been owned by
the military for 50 years, but has been dormant for the last 40 years. The air base is within
a mile of Kara and Larry’s property. Jets have begun training exercises, creating sonic
booms loud enough to cause vibrations throughout the local homes. All of the homes in
the area have consequently decreased significantly in value.
Advise Kara and Larry on any viable claims and possible remedies.
3 Steve, a nurse at St Christopher’s Private Hospital, hates his neighbours, Bill and Mary.
Last week, Bill was admitted to St Christopher’s and, in the course of the operation that
Bill was undergoing, the surgeon, noticing that Bill required a blood transfusion, asked
Steve what the relevant blood group was. Steve knew that Bill’s group was Group A, but
he deliberately told the surgeon that it was blood Group B. The operation was
completed successfully, but Bill became very ill after having a strong reaction to the
Group B blood he had been given.
Steve did not stop there. He discovered that Harry was the main customer of Mary, who
cultivates orchids commercially. Steve told Harry that Harry could just as easily buy
equally good orchids at no extra cost from Mary’s rival, Tina. Steve added: “If you know
what’s good for you, and you value your good looks, Harry, you’ll be buying your orchids
from Tina in future”. Harry, worried by Steve’s words, apologised profusely to Mary. He
told her what Steve had said and explained that he did not feel he had any choice but to
take his custom to Tina instead. He duly did this.
Advise Bill, Mary and Harry on any tort actions they may bring against Steve.
Section B
4 “Establishing a novel duty of care is of great excitement for negligence lawyers, but a
hollow victory for claimants who then fail to prove that it was breached …”
(J O’Sullivan, ‘A duty of care to breach medical confidentiality?’ [2020] CLJ 214)
Do hurdles to successful negligence claims lie at the level of a particular element of
negligence, of the interaction between the elements, or in establishing defences such as
volenti or illegality? Critically Discuss.

Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA’s managerial role of enforcing these functions?

Description
4DQ1
Protecting data security, privacy, and integrity are important database functions. What activities are required
in the DBA’s managerial role of enforcing these functions? Using SQL statements, give some examples of
how you would use the data dictionary to monitor the security of the database.
4DQ2
Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data,
preferably data related to health care. Describe the incidents and explain what could have been done to
prevent or mitigate them.

Discuss the top two roles of strategic internal communication for successful change initiatives.

Description
4V
Overview
In this course, the learner-faculty connect video check-in assignments will be used for discussing the
Milestone One, Milestone Two, and project guidelines. These are private conversations between you and
your instructor, and you may validate your understanding of the concepts presented and the requirements of
the milestone and project activities.
In Milestone Two, you are required to create a change management plan for the U.S. branch of the software
solutions provider headquartered in Singapore. You are encouraged to reach out to your instructor so you can
address any concerns and questions prior to the week when you are required to submit Milestone Two.
Prompt
In this mentor-focused video check-in, you will look at the Milestone Two Guidelines and Rubric and have
an asynchronous discussion with your instructor regarding the points mentioned below.
Record a short video sharing your understanding of the guidelines to be followed for Milestone Two.
Consider the following questions:
What could be an internal communication issue in the U.S. branch?
Discuss the top two roles of strategic internal communication for successful change initiatives.
Discuss the influential roles that managers play to address any issues in the U.S. branch.
How can managers support employee engagement?
If you have any questions or require additional support from your instructor, clearly communicate your needs
to your instructor