Globalization has stimulated discussions about human rights – powers, privileges, and material resources to which people everywhere, by virtue of being human, are justly entitled.

Globalization has stimulated discussions about human rights – powers, privileges, and material resources to which people everywhere, by virtue of being human, are justly entitled. As you are watching the video documentary “Between Borders: American Migrant Crisis” consider the questions below. Take notes as your encounter these concepts. Finally, choose (1) one question to discussion on this week’s discussion board.Why are these migrants leaving their home countries? Do you see examples of migration due to human (in)security? If so, what are those?How might the migrants you see in the video be labeled? Are the refugees, asylum seekers, IDPs or possibly economic migrants? How will their classification potentially impact their journey and possible resettlement?Do you see examples of possible human rights abuses? If so, what are those?How might a policy of “multiculturalism” lead a culturally diverse state to greater social stability? What might those policies include?How might the greater promotion of human rights within the international system work in tandem with a domestic policies that promote “multiculturalism”? What might those policies include?How might the concept of “culture” help us to think about human rights?Are human rights part of culture?Why are we challenged by the arrival of migrants in our country?Some have argued that there should be free and open migration anywhere around the world. What would be the result if individuals could easily go anywhere in the world?In a globalizing world, the call has come for recognition of new forms of citizenship over traditional notions of “territorial citizenship”. Might more flexible forms of citizenship help international migrants?

In the context of an audit of financial statements, explain what is meant by professional skepticism.

Please answer the below and submit in a word document. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words. E-Book: Principles of Auditing and Other Assurance Services. 21st Edition. O.Ray Whittington and Kurt Pany. 2019 McGraw-Hill. This textbook is preferred, but optional. in the context of an audit of financial statements, explain what is meant by professional skepticism. In the context of an audit of financial statements, explain what is meant by professional skepticism.

What are the key methods of identity development?

APA Format/ No plagarism/ 7 Slides/ Provide Examples/ Rubric AttachedYou are working for a local department store in the Operations Department. You notice that their business practices and use of technology are not up to date. One day while working, you are having a discussion about technology and identity formation with your supervisor. Your supervisor continues to explain that individuals and organizations have digital identities that are formed and impacted through various methods. Your supervisor continues, saying, “They can develop or change through social media, positive or negative press, word of mouth, and so on.”You begin to understand that the digital footprint of a business or organization can greatly impact their success or failure due to many factors, including the rapid dissemination of information that can occur digitally.Your supervisor, through the course of the discussion, acknowledges that you are very fluent in the area of digital identity and asks you to conduct research and create a visual presentation explaining how digital identity is formed for both individuals and organizations. Your supervisor says, “This visual presentation will be presented to not only me, but company stakeholders and your coworkers in order to help them understand how identity is formed, and how to best maximize digital identity to contribute to the overall success of our store.”Your supervisor continues, saying, “From this presentation, decision makers will be able to work on identity management and can then implement digital strategies in order to maintain or improve the store’s identity. In the end, this is intended to help increase exposure to the store, enhance the customer base, and the overall success of the store. The visual representation should be interactive and informative and can be presented in any visual format that you choose.”For this research and presentation, you are to reflect upon and address the following topics:What are the key methods of identity development? Consider available technology, socioeconomic status, generational issues, access to technological resources, etc.Explain how technology and digital forums can aid in identity formation.Consider available technology, socioeconomic status, generational issues, access to technological resources, etc.Are there differences between identity development in the digital world and in the physical world?As technology improves and changes, what are some things that individuals and organizations do to impact change and development in the digital age?How can individuals change the course of action for organizations and their digital footprint?How is the digital identity of your store in the above scenario formulated, and what impact might that identity have on the overall success of the store.

How can management can enhance the use if diversity throughout the organization?

Diversity often is used in the context of legal requirements as mandated by discrimination and harassment laws, and in the past has referred to “protected classes,” such as gender, race, color and religion. In fact, diversity encompasses all of the potential differences that affect how we interpret and behave, differences that are so commonly encountered that we might fail to understand their power. It is important to take a look at how diversity impacts a growing and changing healthcare industry. Analyze three ways the growing diversity of the healthcare workforce affects the management of a healthcare organization today. How can management can enhance the use if diversity throughout the organization? Use examples in your response that show how this can happen.

you will be taking on the role of a cybersecurity practitioner. You will need to act as a domain expert communicating to a non-expert stakeholder.

Prompt: For the summative assessment, you will be taking on the role of a cybersecurity practitioner. You will need to act as a domain expert communicating to a non-expert stakeholder. For this milestone, you will be focusing on details of the investigation: resources needed, methods, and findings. Remember that the forensic notes provided to you may assist you in addressing the critical elements. Specifically, the following critical elements must be addressed: I. Key Details: Describe how the results from the forensic investigation assisted you with resolving the incident and identifying security impacts. II. Implications for Legal Action: Describe the accuracy, validity, and defensibility of the investigative steps that were taken. III. Audience Appropriate: Your entire internal memo should employ brevity and consumable language while presenting the necessary information. Rubric Guidelines for Submission: Your assignment should adhere to the following formatting requirements: Write 3 to 4 double-spaced pages using 12-point Times New Roman font and one-inch margins. You should use current APA style guidelines for your citations and reference list.

Research and assess the ethical issues related to data customer collection and information management.

Now that the Crusin’ Fusion website is up-and-running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In order to participate, the customer will need to enter first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card.Kiran supports this idea but has concerns she wants the team to consider before moving forward. She has asked that you prepare a 6- to 10-slide presentation with speaker notes for the next web meeting to address the following:Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in order to use the name suggested by the winner? What protection or disclaimer does the customer require?Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest.

Change is very difficult for some people. As a leader, how would you deal with your follower’s resistance to change?

Create a document with answers to the following questions. Be thorough and elaborate your responses!1. Change is very difficult for some people. As a leader, how would you deal with your follower’s resistance to change?2. Describe a situation in your life where you experienced real change. How did you respond to this change? Explain the results of this change.3. In the movie, Schindler’s List, how did Stern persuade Schindler to change the way he was doing business and use prisoners in his factory as laborers? Why is Schindler convinced?4. In detail, explain why you believe people resist change.5. In general, do you perceive yourself to be a change implementer or a change resister? Give explanation (or an example of a personal experience) for your response.

Job designers must focus on four things that directly relate to the job: what, who, how, and where.

Job designers must focus on four things that directly relate to the job: what, who, how, and where.What type of work is in the job?Who is the person(s) selected to do the job (available skills)?How will the work be completed (method)?Where is the work located?There are two schools of thought for job design—specialization and the other behavioral approach. For this discussion, respond to the following:Explain at least one reason for the need of the specialization and behavioral approaches to job design.Identify at least two similarities and/or differences between the specialization and behavioral approaches to job design.Describe how methods analysis is linked to productivity improvements. Provide an example to illustrate your response.

Give an example of the use of physical separation for security in a computing environment.

1. Give an example of the use of physical separation for security in a computing environment.2. Give an example of the use of temporal separation for security in a computing environment.3. Give an example of an object whose sensitivity may change during execution.4. Respond to the allegation “An operating system requires no protection for its executable code (in memory) because that code is a duplicate of code maintained on disk.”5. Explain how a fence register is used for relocating a user’s program.6. Can any number of concurrent processes be protected from one another by just one pair of base/bounds registers?7. The discussion of base/bounds registers implies that program code is execute only and that data areas are read-write-only. Is this ever not the case? Explain your answer.8. A design using tag bits presupposes that adjacent memory locations hold dissimilar things: a line of code, a piece of data, a line of code, two pieces of data, and so forth. Most programs do not look like that. How can tag bits be appropriate in a situation in which programs have the more conventional arrangement of code and data?9. What are some other modes of access that users might want to apply to code or data, in addition to the common read, write, and execute permission?10. If two users share access to a segment, they must do so by the same name. Must their protection rights to it be the same? Why or why not?11. A problem with either segmented or paged address translation is timing. Suppose a user wants to read some data from an input device into memory. For efficiency during data transfer, often the actual memory address at which the data are to be placed is provided to an I/O device. The real address is passed so that time-consuming address translation does not have to be performed during a very fast data transfer. What security problems does this approach bring?12. A directory is also an object to which access should be controlled. Why is it not appropriate to allow users to modify their own directories?13. Why should the directory of one user not be generally accessible to other users (not even for read-only access)?14. File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?15. One feature of a capability-based protection system is the ability of one process to transfer a copy of a capability to another process. Describe a situation in which one process should be able to transfer a capability to another.16. Describe a mechanism by which an operating system can enforce limited transfer of capabilities. That is, process A might transfer a capability to process B, but A wants to prevent B from transferring the capability to any other processes. Your design should include a description of the activities to be performed by A and B, as well as the activities performed by and the information maintained by the operating system.17. List two disadvantages of using physical separation in a computing system. List two disadvantages of using temporal separation in a computing system.18. Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

Research paper on privacy and security

Identify a problem in area (a) or (b). Submit the problem title and one paragraph description of the problem for “Research Paper assignment Part 1”; once your submitted problem is approved, submit maximum two page write-up on how you think the related issues could be addressed.Research Problems: Area (a): Inclusive Privacy SolutionMasking sure that a privacy solution does not ignore concerns of a group of peoplePlease look for example papers in WIPS (WIPS – Workshop on Inclusive Privacy and Security)Area (b): Usable Privacy SolutionA privacy solution that people uses with comfortExample: Privacy notice? Not a usable solution (we mostly never read them because the way they are written is hard to comprehend)Password is primarily a security tool, but also a privacy tool.Is password usable? Not much. Creating and remembering strong password is difficult.