An agent embezzles funds from his principal and uses the funds to buy a car. What duties has the agent violated? Who is entitled to ownership of the car?

*An agent embezzles funds from his principal and uses the funds to buy a car. What duties has the agent violated? Who is entitled to ownership of the car?Your discussion should involve elements of employment law and elements of criminal law.  You should also fully discuss an agent’s duty to their employer as well as the duties that the agent violated in this situation.  Be sure to tell me who has legal ownership of the car and give the legal reasons for your answer.  This assignment must be long enough to fully discuss the questions in detail.

Using one of the three organizations profiled, explain how the pillars of information security (confidentiality, integrity, and availability) influenced the risk tolerance perspective of the organization

The purpose of this assignment is to analyze an organization’s tolerance for risk and develop an appropriate security policy to address risk.Part 1:Using the assigned reading and your own research, write a 500-word paper that defines the three levels of risk tolerance (risk-averse, risk-neutral, and risk-seeking). Include the following in your discussion.Provide a real-world organization that is an example of each level of risk tolerance. Include the company name and industry for each. Include an explanation of whether the company is risk-averse, risk-neutral, or risk-seeking.Summarize the advantages and disadvantages each organization faces while engaging in the form of risk tolerance it exhibits.Using one of the three organizations profiled, explain how the pillars of information security (confidentiality, integrity, and availability) influenced the risk tolerance perspective of the organization in your discussion, consider the regulations the organization must adhere to, relationships with third-party organizations with remote access, customer expectations of security, and the level of availability the organization must sustain.Part 2:Using the “Information Security Policy Template,” complete the policy in alignment with one of the three organizations you explored in Part 1 of the assignment. Ensure you design the policy in accordance with the risk tolerance of the organization. Include the following in your design:Identify 20 potential risks, defining both threat (condition) and impact (consequence). Review Chapter 1 in Information Security Risk Assessment Toolkit: Practical Assessments Through Data Collection and Data Analysis when completing this portion of the assignment.Define a policy to monitor (risk-seeking), control (risk-neutral), or remove (risk-averse) the risk.Submit the 500-word paper and completed “Information Security Policy Template.”Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance. Attachments

Are most crimes committed with legally or illegally obtained guns?

Prompt: After working through the assigned resources in this module, create a problem catalog to begin exploring problems, problem situations, and the systems in which they appear.   Consider problems at various levels:  Worldwide, cross-national, and cross-cultural problems  Nationwide problems, affecting all or most Americans  Problems specific to an economy, an environment, an industry, a company, or an organization  Problems specific to a population segment such as children, seniors, employed or unemployed, disabled, athletes, executives, engineers, women, and so on.  Note: Be sure to include at least two problems that are related to your own workplace, a former workplace, or a current or former organization that you are affiliated with (church, local government, nonprofit agency you volunteer for, etc.)  Consider using resources such as periodicals, newspapers, magazines, blogs, news websites, discipline-specific journals, conference presentations, and other sources found on the web or in the Shapiro Library. As always in your research, be aware of source credibility and possible bias (your own and that of your source). List ten problems in your problem catalog and identify system elements, issues, concerns, and questions that would be needed to understand the entire system that contributes to the problem. See the “wrong” (Example One) and “right” (Example Two) examples below. For your own purposes, you should also note your initial thoughts about how the problem might be analyzed using systems thinking and research that might be needed.   Specifically the following critical elements must be addressed:  State at least ten problems, formulated in a way that leads to systems thinking. At least two problems should be related to your own workplace, a former workplace, or a current or former organization that you are affiliated with (church, local government, non-profit agency you volunteer for, etc.).  For each problem, identify the problem elements.     For each problem, identify the problem issues.  For each problem, identify the concerns and/or questions that one should consider when trying to understand the entire system involved in the problem.   Example Two: Systems thinking approach This problem statement and identification of issues allows you to begin understanding the system that is producing the problem situation:  Problem: In America, there are too many group shootings in schools and other public places. Elements: Sources of guns, legal and illegal gun supplies, other weapons, victim injuries/deaths Issues: Gun availability to those who commit the crimes, motivations of shooters, protection of environments, types of guns used in crimes, and gun availability for defense/protection and alternatives Questions: Are most crimes committed with legally or illegally obtained guns? What are the underlying societal issues that foster violence? What are the motivations of the shooters? How do we address underlying issues in a way that fosters nonviolent solutions? How can society as a whole intervene? Is arming oneself for defense purposes a deterrent to violent crime?   Guidelines for Submission: Your problem catalog should be submitted as a 2 page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. If sources are used, they should be cited using APA style.

Explain the major policies of Andrew Jackson. How did these policies strengthen or weaken the role of the federal government? Explain. 

You will choose 2 of the 4 questions to answer. Your answers should be thoughtful, in depth and fully explain your understanding of the information. Remember, this is your opportunity to show what you know and understand. Make sure to give examples and evidence from the textbook and readings to justify or explain your answers.  Your answers should be about 150-200 each. If your answer is less than 100 words or does not fully answer the question, points will be taken off. You want to show me what you know. *** Please write on your own word*******I also uploaded the Discussion Board example from my Professor*****1. Compare the members of the “Great Triumvirate” and explain each member’s ideology or viewpoint. How did each man’s views reflect that of the region he was from? Explain.  3. Explain the major policies of Andrew Jackson. How did these policies strengthen or weaken the role of the federal government? Explain.

If Americans live in such a great democracy, why do they vote at rates which are among the lowest in the democratic world?

One of the hallmarks of a democracy is the theoretically strong relationship between political participation and the health of that democracy. Political scientists use the statistic “voter turnout” to describe political participation in the electoral process. Voter turnout (or VT) is calculated by dividing the number of votes cast in a particular election by the number of registered voters (in other words, the number of votes divided by who could have voted). The level of VT in the US is relatively lower than in other democracies. Please respond to the following questions: 1) If Americans live in such a great democracy, why do they vote at rates which are among the lowest in the democratic world? Why do other democracies have higher voter turnout? Is the problem psychological? Cultural? Institutional? Please discuss at least three possible reasons that directly relate to low VT in the US.2) Assuming that low voter turnout in the U.S. is a problem (an assumption you may wish to challenge), how would you attempt to increase voter turnout? Please discuss at least two possible ways to increase VT in the US.Write at least 250 words explaining your position.  {Any quoted text in your submission does not count towards the minimum word count requirement.}Please write in your own word explaining the questions.

Would you change your answer if, instead of working at a paper supply company, you worked as a nurse?

Case Study: Ethical DilemmaYou work at a paper supply company that employs 50 people. A coworker, Karen, is not your favorite person to work with. She is often late to work, can be unprofessional with coworkers, and isn’t someone you can routinely count on to go above and beyond her job duties. Last week you even noticed that her breath smelled like alcohol when you spoke to her about some last-minute orders that needed to be filled. But, you don’t like to rock the boat and you don’t like to be disloyal to your coworkers, so you didn’t say anything. However, David Chan just approached you and asked whether you smelled alcohol on Karen’s breath last Thursday. You are surprised and ask him why. David mentions that he heard some gossip and wants to confirm if it is true or not.What will you do?1. Should you admit you smelled alcohol on Karen’s breath last week? Why or why not?2. What are the implications of each course of action?3. Would you change your answer if, instead of working at a paper supply company, you worked as a nurse?

What four steps are necessary to conduct a predictive validation study?

1.What four steps are necessary to conduct a predictive validation study? 2.What is utility, and what three things affect the utility of a selection battery?  3.Identify and describe each type of training needs analysis. For each type, explain how you would go about performing the analysis.  4.Describe three actions an organization can take to help employees who have undergone training to transfer their new skills to their jobs. 5. Identify and describe each of the three major categories of motivation theories. How do the categories differ from each other?  6.You are an HR manager who needs to explain the management by objectives (MBO) process to your company. What will you say? What can you tell the company about what research has to say about this process?

List and Explain TWO examples of good communication skills in the workplace when verbally communicating face-to-face or using email.

List and Explain TWO examples of good communication skills in the workplace when verbally communicating face-to-face or using email.  List and Examples TWO examples of  poor communication skills in the workplace when verbally communicating face-to-face or using email.    Explain your answer and any other details in at least 5 sentences each