Describe the role of the EEOC in the practice of I/O psychology and three different laws that are enforced by the EEOC.
  • Describe the role of the EEOC in the practice of I/O psychology and three different laws that are enforced by the EEOC.
  • Describe two different types of discrimination prohibited by the laws enforced by EEOC and at least three best practices you would suggest for ensuring equity in the workplace.
  • Suppose you find yourself in an elevator with the CEO of a Fortune 500 company that you admire greatly. You strike up a casual conversation that suddenly turns to the topic of discrimination in the workplace, and you quickly realize that the CEO has no understanding of I/O psychology or I/O psychologists’ roles in addressing these concerns. One day you hope to begin your I/O career at this company or one similar to it. Therefore, you decide to give a quick elevator speech on I/O psychology and its role in best practices to address discrimination and inequity in the workplace. What would you say?
Research on fraud red flags, provide the descriptions and discuss the cause of each red flag

Financial data red flags present themselves in the form of unrealistic forecasts and unusual account increases or decreases in income statement and balance sheet accounts. Software data detection programs are developed to identify red flags.

Instructions

  • Using the Internet, research two (2) fraud podcasts presented by the Association of Certified Fraud Examiners and discuss what you learned.
  • Research on fraud red flags, provide the descriptions and discuss the cause of each red flag
Evaluate the effectiveness of federal regulations and strategies to address emerging issues in the accounting field.

Search the Strayer databases or Internet for hot topics and emerging issues of financial statement fraud and other fraudulent acts committed by publicly traded companies, including those identified by the PCAOB. Consider the topics, trends, and longevity of issues identified and evaluate the effectiveness of federal regulations and strategies that address those issues.

Instructions

Write a 4–6 page paper in which you:

  • Create an argument in agreement or disagreement that the creation of the PCAOB has been effective with improving the reliability of audited financial statements for the public users of the information. Defend your position with at least three examples and rational explanations.
  • Assess and provide three substantive examples of how the PCAOB has impacted the accounting profession, given the shift from self-regulation to federal regulation. Provide a rationale for the assessment.
  • Assess at least five stages of the system design life cycle model and how they would impact the emerging issue.
  • Recommend a strategy for dealing with the emerging issue and determine three types of fraud schemes that might go undetected if recommendations are not implemented. Provide support for the recommendation.
  • Use at least three quality sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
  • Produce writing that is clear and well organized and applies appropriate SWS style. Writing contains accurate grammar, mechanics, and spelling.

The specific course learning outcome associated with this assignment is:

  • Evaluate the effectiveness of federal regulations and strategies to address emerging issues in the accounting field.
Using the Internet or Strayer databases, research risks associated with fraud, effective techniques that could be used to prevent or detect fraud, and the roles and responsibilities within the organization for preventing and detecting fraud.
  1. Fraud Prevention and Detection Policy
    Overview
    Having assisted the SEC and other companies as a CFA, now envision yourself in the role of a senior internal auditor. You have been charged by the board of directors with assessing risk exposure for Innovative Hockey Gear, LLC, a hockey equipment distributor.
    Using the Internet or Strayer databases, research risks associated with fraud, effective techniques that could be used to prevent or detect fraud, and the roles and responsibilities within the organization for preventing and detecting fraud.
    Instructions
    Write a 3–4 page paper in which you:

    1. Determine the types of exposure to fraud that the company could be exposed to and the related consequences to the organization. Provide a rationale for your response.
    2. Evaluate tools and techniques that are the most effective in preventing and detecting fraud, making a recommendation for the tool that has the highest cost-benefit factor. Provide a rationale for your recommendation.
    3. Evaluate the roles and responsibilities in the company to prevent and detect fraud, indicating how a culture of integrity can be created within these roles.
    4. Use at least three quality resources in this assignment. Note: Wikipedia, Investopedia, and similar websites do not qualify as quality resources. You have access to Strayer University’s Online Library and the iCampus University Library Research page.
    5. This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
      The specific course learning outcome associated with this assignment is:
    • Create a recommendation for a fraud prevention tool based on an analysis of potential exposure and organizational accountability.
Evaluate the various tools / techniques available to auditors to prevent or detect fraud

Using the Internet or Strayer Library, research the articles about Fraud Prevention and Detection Technology.

  • Evaluate the various tools / techniques available to auditors to prevent or detect fraud. Based on your analysis, propose the most effective audit tools / techniques that would have prevented or detected the fraud. Support your proposal with examples.
  • Evaluate what drivers would cause you to commit fraud (keep in mind that fraud investigators sometimes have to think like a fraudster to understand the motives, and with this exercise you have to think like a fraudster here!!!). Based on that evaluation, rank the drivers and the types of fraud you would be willing to commit. Propose a solution for society as a whole to prevent fraud. Support your solution with examples and a rationale.
study a recent nursing informatics-related healthcare policy, and you will share the relevant details via a fact sheet designed to inform and educate.

As a professional nurse, you are expected to apply your expertise to patient care. On occasion, you will also be expected to share that expertise.

With evolving technology and continuous changes to regulations designed to keep up these changes, there is usually a need to share information and expertise to inform colleagues, leadership, patients, and other stakeholders

Corporations are increasingly moving their data to the cloud. Select an organization, national or international, that has used or should consider using cloud technology

Corporations are increasingly moving their data to the cloud. Select an organization, national or international, that has used or should consider using cloud technology. Then, address the following requirements:

  1. Explain details (e.g., mission, vision, values, industry) about the organization that you selected.
  2. Outline some of the advantages and disadvantages with your selected company using the cloud.
  3. Explain industry practices. Do other organizations in your selected organization’s industry use the cloud? Why or why not?
  4. What are some of the factors that must be considered before any organization uses the cloud?

Instructions:

  • Your well-written report should be 6 pages in length, not including the title and reference pages.
  • To make it easier to read and therefore grade, make sure you clearly delineate each section of your answer so it can be matched with the relevant question.
  • Use APA style guidelines,

Citing at least three peer-review references in support of your work, in addition to your text and assigned readings.

Discuss SANS Security Controls
  1. As a portion of security compliance, one of the board members used SANS security controls at a former business and was very pleased with its outcomes. Based on this knowledge and to meet the needs of the board members, you have decided on implementing a few monitoring rules to help meet the requirements of five of the SANS Top 20 Controls.
    For this part of your project, you will be addressing the following SANS Security Controls:

    • Asset Inventory of Authorized and Unauthorized Devices
    • Software Inventory of Authorized and Unauthorized Devices
    • Malware Defenses
    • Boundary Defense
    • Controlled use of Administrative Privileges
    • For each of these controls below, create a document that details the following information for each monitoring rule:
    • Brief description of the monitoring used and the alerting processes
    • Devices to pull log data from in order to satisfy the monitoring rule.
    • Frequency of the log data collection: (Real-Time, Hourly, Weekly, Monthly, Annually)
    • At least two ways this monitor could be tested to validate any false positives or negatives
    • Your reports should use professional tone and vocabulary, APA format, and proper spelling and grammar.
      Submit your completed assignments by following the directions linked below. Please check the Course Calendar for specific due dates.
      Save your assignments as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504