Write, craft and present an Oral History Story. (guideline 4-6 minutes) If you need more time

Write, craft and present an Oral History Story. (guideline 4-6 minutes) If you need more time, there is no maximum time restraint, but the story should be at least 4 or 6 minutes long.

This is a story based on something interesting you would like to share about your family or close friends  (extended family, friends, past or present family – whatever ‘family’ means to you).

 

You must use ONE *object in your story that is personal to you and relates to the story you choose to tell to use as a prop in this story. Please do not sit down for most or all of this story, but rather stand and use the space a bit or use a combination of sitting and standing – according to what you are saying.

(*an object can be anything, a photo, memento, drawing, box, article of clothing, etc. etc.)

Present your story in any style/technique you choose. This is an individual presentation.

The article, “The Egg Thief,” follows the history of the international criminal, Jeffrey Lendrum and his violations of tampering and selling protected species.

COMM 441: Assignment #1 (15 pts.)

Due Date: Saturday, January 19, 11 pm DropBox on Moodle

The article, “The Egg Thief,” follows the history of the international criminal, Jeffrey Lendrum and his violations of tampering and selling protected species. At the end of this article, it states that his trial is this week (January 7, 2019). What new information can you find about Jeffrey Lendrum and his case? What information can you find out about Jeffrey Lendrum and the people he’s worked with through online videos and/or articles?

 

  1. Read “The Egg Thief Article.”
  2. Write a short summary about Jeffrey Lendrum and his international violations of wildlife.
  3. Research the supporting articles, documents, and videos online about this topic.
  4. What new information can you find out about his trial?
  5. How is stealing eggs an international concern? Why is this person a criminal and what is at stake when people like Jeffrey Lendrum commit these types of crimes?
  6. What kinds of organizations can you find online that promote the protection of wildlife in different countries.
  7. Write your paper – 4 pages, 12-pt. font, double-spaced, and edited with citations.

As a criminal justice system employee, you will interact with people from different walks of life, because of such things as their ethnicity, nationality, socioeconomic status, gender,

As a criminal justice system employee, you will interact with people from different walks of life, because of such things as their ethnicity, nationality, socioeconomic status, gender, or sexual orientation. All people see the world through the lens of their own background and experience, and we cannot impose our own values and experience on the experience of others.

This assignment is designed to assist you to integrate cultural influences with your understanding of victims. Select a crime (i.e., rape, robbery, assault, etc.) and using scholarly sources for information identify how this type of crime can affect a victim, their family members, and other members of society keeping in mind any cultural variations.

 

Tasks:

In a minimum of 300 words, respond to the following:

  • Identify a victim of a specific crime with a background different from your own. Research at least three scholarly resources from the professional literature. The literature may include the Argosy University online library resources, relevant textbooks, peer-reviewed journal articles, and websites created by professional organizations, agencies, or institutions (.edu, .org, and .gov). Report your findings regarding the definition of trauma and the resources used to heal from traumatic experiences.
  • Discuss how it might impact their families based on their cultural background.
  • Discuss how it might be perceived by society based on the victim’s cultural background.

All written responses should follow APA rules for attributing sources.

Submission Details:

  • By the due date assigned, post your responses to this Discussion Area.
  • Through the end of the module, respond to at least two of your classmates’ posts. While responding, compare the similarities and differences between what you have constructed and what your classmates have.

Discussion Grading Table  Maximum Points    Quality of initial posting, including fulfillment of assignment   16    Quality of responses to classmates  12    Frequency of responses to classmates  4    Reference to supporting readings and other materials  4    Language and grammar  4    Total:  40

No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees

The following scenario is based on an actual attack deconstructed at a seminar I attended earlier this year. The names and locations have been removed to preserve the privacy of the organization in question.

 

Background:

No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.

Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.

 

Attack Analysis:

After collecting evidence and analyzing the attack, the third party was able to recreate the attack.

No-Internal-Controls, LLC has a number of PCs configured for employee training

These training computers use generic logins such as “training1”, “training2”, etc. with passwords of “training1”, “training2”, etc.

The generic logins were not subject to lock out due to incorrect logins

One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees

Due to high employee turnover and lack of documentation none all of the IT staff were aware of the legacy remote access

The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote desktop connections

The internal network utilized a flat architecture

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access

The attacker installed tools on the compromised host to scan the network and identify network shares

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files

Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost

Instructions:

You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.

  • Suggest one or more policies that would help mitigate against attacks similar to this attack
  • Suggest one or more controls to support each policy
  • Identify each of the controls as physical, administrative, or technical and preventative, detective, or corrective.
  • Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget
  • Do not attempt to write full policies, simply summarize each policy you suggest in one or two sentences.
  • Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy
  • 3-5 pages in length.
  • APA format.. citations, references etc…

Please read and familiarize yourself with the general description for your research project included in the CONTENT section of iLearn.

Please read and familiarize yourself with the general description for your research project included in the CONTENT section of iLearn.

You are the team leader/chair for the Information Governance Committee/Team responsible for implementing a company wide information governance program for your organization. You team has met on one occasion and has identified an initial set of goals and challenges for the organization in the development and implementation of the company’s IG program. Your second meeting with the team is fast approaching and you have told your team members that during this next meeting you will discuss with them the overall plan and the steps that the team will take in order to implement information governance in the organization. In order to be prepared for that meeting, please do the following:

1. Conduct the necessary research to familiarize yourself with different organizations, associations, affiliates and accrediting agencies who can provide guidance on the implementation of information governance in the health care industry. Please summarize and explain the results of your research.

 

2. Develop in writing a detailed, step-by-step plan for an overall information governance plan at CITY GENERAL HOSPITAL. You may use diagrams, tables, and any other references that assist in the explanation of your information governance plan. However, you may NOT substitute your table or diagram for a complete narrative explanation.

3. Recall, the author of your text has repeatedly emphasized that above all else you must operate within the confines of the law. Assume CITY GENERAL HOSPITAL is located in Louisville, Kentucky. Conduct the necessary research to familiarize yourself with both the federal and state laws that will must be taken into consideration and/or which will have a direct impact on the health care industry, and therefore your organization’s information governance plan. You must be able to explain to your team members what these laws are, their sources, how they affect your organization, and what you will do to implement your information governance program within the confines of these laws. Please in writing provide a detailed explanation of the results of your search for legal information in a format that you would be able to hand out to your team members during your next meeting.

Based on your reading in the text and credible research from the Internet, respond to the following:

As the 21st century approaches, changing societal issues and priorities present new challenges to the law enforcement community. Society demands remedies to rising crime rates, drug use, and traffic fatalities/injuries, and communities want increased police visibility. However, law enforcement agencies, in most cases, are expected to do this with current or static resources and budgets. As a result, law enforcement administrators are searching for new ways to do business and for more efficient and effective uses of existing resources. Proactive law enforcement is an effective tool that can assist in meeting these new challenges.
Based on your reading in the text and credible research from the Internet, respond to the following:

  • What major characteristics identify the proactive police agency?
  • If you had to prioritize the changes needed within the police department to convert from a reactive form of policing to one that is more proactive, what would your priorities be?
  • What do you see as the greatest impediment to implementing a proactive style of policing?
  • What do you see as the greatest benefit of implementing a proactive style of policing?

400-600 words
Due 01/21/19

Another approach is to isolate them in special schools designed to handle discipline issues while concentrating the problem children into a single location.

There have been a number of different approaches used to handle problematic students in schools. One direction is to main-stream the problem children in hopes that by surrounding them with pro-social peers, they will see what is acceptable and unacceptable behavior and conform.
 
Another approach is to isolate them in special schools designed to handle discipline issues while concentrating the problem children into a single location.

diverse population you encountered at the agency (for example, in Piedra and Engstrom’s article, it was immigrant families), respond to the following:

Piedra and Engstrom (2009) noted how the life model “remains general and unspecific regarding factors that affect immigrant families” (p. 272). Recall that there will never be one theory or a model that can fully explain a phenomenon or lay out all the steps and procedures when working with complex issues that clients present to social workers. Recognizing this, Piedra and Engstrom selected another theory in the immigration literature—segmented assimilation theory. They identified concepts from segmented assimilation theory to “fill in” the gaps that the life model does not address.
In this Discussion, you examine gaps in the life model by applying it to your field experience.
 
Post:
Using an example from your fieldwork experience (Georgia Department of Family and Children Services) and a diverse population you encountered at the agency (for example, in Piedra and Engstrom’s article, it was immigrant families), respond to the following:

  • Identify and describe the diverse population and the unique characteristics and/or the distinctive needs of the population in 3 to 4 brief sentences.
  • Explain how the life model can be applied for the population.
  • Explain where the gaps are in applying the life model for this population.
  • When looking at the gaps, explain which theory might be helpful in filling the gaps of the life model when working with this population.

Case Study 1: Understanding the Court System

Case Study 1: Understanding the Court System
Due Week 3 and worth 200 points
The U.S. Court System is a complex system that includes both federal  and state-level courts. The federal system includes the judicial branch  of the government. This system is designed to help society interpret the  U.S. Constitution and provide guidelines for society. Court cases may  concern many different topics and have an unlimited number of outcomes.
Use the Internet or Strayer databases to research a civil or criminal court case in which you are interested.
Write a five to eight (5-8) page paper in which you:

  1. Summarize the seminal facts of the case that you chose.
  2. Explain the main laws that have been violated in the case that you chose.
  3. Describe the possible penalties that could be associated with the laws that you just described.
  4. Explain whether your specific case was heard in the state or  federal court system, and include any related jurisdictional  requirements. Explain the fundamental reasons why it was necessary for  the case to be heard in that particular court system.
  5. Summarize the outcome of the case, and indicate whether the judge or jury made the decision.
  6. Discuss whether or not you believe that the outcome of the case was justified. Provide a rationale for the response.
  7. Use at least (3) quality academic resources. Note: Wikipedia and other websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • This course requires use of Strayer Writing Standards (SWS).  The format is different than other Strayer University courses. Please  take a moment to review the SWS documentation for details.
  • Include a cover page containing the title of the assignment, the  student’s name, the professor’s name, the course title, and the date.  The cover page and the reference page are not included in the required  assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Examine the organizational frameworks and decision-making environment in the judicial process.
  • Examine the rule of law in the American court system and in the judicial process.
  • Detail the history and organization of the levels of the American court system and the issue of jurisdictional boundaries.
  • Use technology and information resources to research issues in the criminal court and the judicial process in America.
  • Write clearly and concisely about the American court system using proper writing mechanics and SWS style conventions.

Compare and contrast the two (2) countries for their definition of the crime, crime rate, and tools used to measure the crime

Write a two to three (2-3) page paper in which you:

  1. Review one (1) transnational crime.
  2. Compare and contrast the two (2) countries for their definition of the crime, crime rate, and tools used to measure the crime.
  3. Determine each country’s legal traditions and their major influences on crime definition, rate, and measurement.
  4. Examine  the extent to which crime statistics compiled in different countries  can adequately be compared. Provide support for the response.
  5. Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • Be  typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.
  • Include  a cover page containing the title of the assignment, the student’s  name, the professor’s name, the course title, and the date. The cover  page and the reference page are not included in the required assignment  page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the nature of globalization, and assess the aims and methods of comparative criminal justice and criminology.
  • Explain the nature and extent of various types of transnational crime.
  • Describe the principles of the four (4) major legal traditions and types of legal systems around the world.
  • Use technology and information resources to research comparative perspectives in criminal justice.
  • Write clearly and concisely about criminal justice topics using proper writing mechanics and APA style conventions.