what does a crime analyst job involves

Draft a short paper (2–3 pages), and complete the following tasks:

  • Explain the different types of writing criminal justice professionals do regularly in the field. Consider the writing professional must do to accommodate for the variety of audiences and purposes for which they write. In your explanation include at what intervals they are likely to write those documents, to whom and for whom, as well as the pressures they face while writing them such as deadlines.
  • Explain the different situations that require effective workplace communication in the criminal justice field. Consider the rhetorical situation: audiences, purposes, and external pressures faced while writing, and so forth.

Be sure to use a formal APA formatted document cover page for this assignment. The APA formatted cover page should include the following elements:

  • Your name.
  • The document title.
  • The course name, number, and section.
  • The date.
  • Your instructor’s name (and typically an indication that the document has been prepared for the instructor and the course).
  • Your contact information (some learners choose to simply put their Capella e-mail address on the cover).
  • An appropriate running head (the start of the running header for the document).

Enclosed Field with Ploughman

Please submit this assignment on Canvas.

  1. Please provide a web-link of the museum/gallery (including artwork) or studio/art-making demo you will discuss.
  1. Please provide the basic information such as artist name/instructor’s name, title of artwork, year it was created, medium, artistic styles, and etc.
  2. Please add your opinions, learning (including the reason you chose the work), and other discussion points in 15 or more sentences, not including the basic information.

You can begin your search of artworks, galleries/museums, studios, materials, and techniques with the following links.

https://www.google.com/culturalinstitute/beta/

https://www.google.com/culturalinstitute/beta/partner

https://www.google.com/culturalinstitute/beta/project

https://www.google.com/culturalinstitute/beta/category/medium

https://www.khanacademy.org/humanities/art-history-basics/artists-materials-techniques

Mobile App Security Assessment and Strategy, assignment help

Debate: How will your administration ensure that Digital Government services are secure?

 

Prepare a three to five paragraph introduction (briefing statement) for a general election debate question:

How will your administration ensure that Digital Government services are secure?

This question will be asked of all candidates participating in the debate (you should not address any single candidate or party).

Your introduction must provide enough information that the candidates understand key terms as defined by you for the debate question:

  • What is meant by “Digital Government services?” (previously called “e-Government” services)
  • Where have past administrations fallen short in protecting Digital Government / e-Government services?
  • What is meant by “Threats” (i.e. individual hackers, politically motivated hacktivists, criminal enterprises, and unfriendly “nation state” actors)

If you need help getting started, read this article: http://www.computerworld.com/article/2848779/list-of-hacked-government-agencies-grows-state-department-white-house-noaa-and-usps.html

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Briefing Statement or Paper
Timeliness of Postings
Quality of Discussion Postings

Paper #2: Mobile App Security Assessment & Strategy

Scenario:

A federal agency has asked your cybersecurity consulting firm to provide it with a white paper that discusses best practices for security architectures and designs for mobile apps. The white paper should also present the agency with a strategy for developing an award winning digital government mobile app for its submission to next years’ Mobi-Gov awards. The agency had several mobile apps in the “honorable mention” category this past year but, each of the apps failed to make passing scores in the mobile app security category.  The contest rules do not allow revision and resubmission of entries from prior years. For this reason, your starting point should be recommendations for a security architecture for a completely new mobile app. 

The scoring for the awards is organized around the three strategies from the federal government’s digital government strategy (see https://www.whitehouse.gov/sites/default/files/omb/egov/digital-government/digital-government.html ).

1.Enable the American people and an increasingly mobile workforce to access high-quality digital government information and services anywhere, anytime, on any device.

2.Ensure that as the government adjusts to this new digital world, we seize the opportunity to procure and manage devices, applications, and data in smart, secure and affordable ways.

3.Unlock the power of government data to spur innovation across our Nation and improve the quality of services for the American people.

Research:

1.Research the “best” of federal mobile apps to see examples of the type of apps the agency will be competing against next year.

a.19 of the Coolest Government Mobile Apps https://www.govloop.com/community/blog/cool-gov-mobile-apps/ 

b.10 Most Entertaining Government Mobile Apps https://www.govloop.com/community/blog/10-most-entertaining-government-mobile-apps/

c.3 Innovative Ways Agencies are Leveraging Mobile Apps http://fedscoop.com/great-government-mobile-apps 

2.Research the federal government’s perspective on mobile app security architectures and design recommendations. Here are three sources to help you get started:

a.Mobile App Developers: Start with Security 

https://www.ftc.gov/tips-advice/business-center/guidance/mobile-app-developers-start-security

b.Mobile Security Reference Architecture 

https://cio.gov/wp-content/uploads/downloads/2013/05/Mobile-Security-Reference-Architecture.pdf 

c.Architecture and Design Considerations for Secure Software (Mobile Applications)

https://buildsecurityin.us-cert.gov/sites/default/files/ArchitectureAndDesign_PocketGuide_v2%200_05182012_PostOnline.pdf 

3.Research industry recommendations for mobile app security. Begin with the following sources:

a. OWASP Mobile Security Project https://www.owasp.org/index.php/OWASP_Mobile_Security_Project 

b.Top 10 Mobile Risks (click on tab) https://www.owasp.org/index.php/OWASP_Mobile_Security_Project

c.Mobile app security: Always keep the back door locked http://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the-back-door-locked/  

4.Find five or more best practice recommendations for ensuring the security of mobile apps. These recommendations must include security for the platform (mobile device), the data on the device, and the transmission path between the device and the mobile application server.

Write:

Write a five (5) to eight (8) page white paper in which you summarize your research and present your “best practices” based strategy for developing an award winning, secure mobile app. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your white paper must include the following:

1.An introduction or overview of mobile apps for digital government. Your overview should include examples of mobile apps which are recognized as being innovative and “best of category” for delivering government information and services to mobile devices. This introduction should be suitable for an executive audience.

2.A separate section in which you discuss the federal government’s requirements and recommendations for mobile app security architectures and the associated design recommendations. This section should be written for non-technical managers; you will need to translate from tech-speak to manager-speak. Diagrams and pictures may be useful but, remember to include the appropriate in-text citations for the source (append to the figure caption).

3.A separate section in which you discuss industry’s recommendations for security architectures and risk reduction for mobile app security.

4.A section in which you present 5 or more best practice recommendations for building security into the new mobile app which will become next year’s entry into the Mobi-Gov awards contest. These recommendations should be presented as your “strategy” for “winning” the security evaluation category for mobile apps.

Submit For Grading 

1.Submit your white paper in MS Word format (.docx or .doc file) using the OPEN Data Assignment in your assignment folder. (Attach the file.)

2.You must also submit your white paper to TurnItIn before the due date for this assignment.

Additional Information

1.Your white paper should use standard terms and definitions for cybersecurity concepts. The following sources are recommended:

•ISACA Glossary http://www.isaca.org/pages/glossary.aspx 

•Guidelines on Security and Privacy in Public Cloud Computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf  

2.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy. 

3.Use APA 6th edition style (formatting) for the organization and appearance of the MS Word document that you submit to your assignment folder. This includes margins, section headings, and consistent use of fonts (Times New Roman 12 in black), paragraph styles (first line indent by ½ inch), and line spacing (double). Formatting requirements and examples are found under Course Resources > APA Resources. Your file should contain both a title page and a separate References page. Use page breaks to ensure that the title page and references page are separate from the body of the paper. 

4.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade. 

Criteria







Provided an excellent overview of mobile apps for digital government. Discussion included 5 or more examples of mobile apps which have been recognized as being innovative or “best of category” for delivering government information and services to mobile devices. The overview appropriately used information from 3 or more authoritative sources.

Provided an outstanding overview of mobile apps for digital government. Discussion included 3 or more examples of mobile apps which have been recognized as being innovative or “best of category” for delivering government information and services to mobile devices. The overview appropriately used information from 2 or more authoritative sources.

Provided an overview of mobile apps for digital government. Discussed the purpose of mobile apps from the federal government.  Included at least one example of a mobile app that is available from the federal government’s app store. The overview appropriately used information from 1 or more authoritative sources.

Provided an overview but the section lacked important details about federal government mobile apps. Information from authoritative sources was cited and used in the overview.

Attempted to provide an introduction to the paper but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 

The introduction and/or overview sections of the paper were off topic. 

Provided an excellent overview of the federal government’s requirements and recommendations for mobile app security architectures and the associated design recommendations. Explanations were written for non-technical managers and included at least three useful diagrams or pictures with appropriate in-text citations for the source (appended to the figure caption). Appropriately used information from 3 or more authoritative sources.

Provided an outstanding overview of the federal government’s requirements and recommendations for mobile app security architectures and the associated design recommendations. Explanations were written for non-technical managers and included at least two useful diagrams or pictures with appropriate in-text citations for the source (appended to the figure caption). Appropriately used information from 2 or more authoritative sources.

Provided an overview of the federal government’s requirements and recommendations for mobile app security architectures and the associated design recommendations. Included at one or more useful diagrams or pictures with appropriate in-text citations for the source (appended to the figure caption). Appropriately used information from 1 or more authoritative sources.

Provided a discussion of the federal government’s requirements or recommendations for mobil app security.Appropriately used information from authoritative sources.

Provided a discussion of mobile app security in the context of the federal government. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

This section was missing, off topic, or failed to provide information aboutmobile app security in the context of the federal government. 

Provided an excellent overview of industry recommendations for mobile app security architectures and the associated design recommendations. Explanations were written for non-technical managers and included at least three useful diagrams or pictures with appropriate in-text citations for the source (appended to the figure caption). Appropriately used information from 3 or more authoritative sources.

Provided an outstanding overview of industry recommendations for mobile app security architectures and the associated design recommendations. Explanations were written for non-technical managers and included at least two useful diagrams or pictures with appropriate in-text citations for the source (appended to the figure caption). Appropriately used information from 2 or more authoritative sources.

Provided an overview of industry recommendations for mobile app security architectures and the associated design recommendations. Included at one or more useful diagrams or pictures with appropriate in-text citations for the source (appended to the figure caption). Appropriately used information from 1 or more authoritative sources.

Provided a discussion of industry recommendations for mobil app security.Appropriately used information from authoritative sources.

Provided a discussion of mobile app security from industry’s perspective. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

This section was missing, off topic, or failed to provide information aboutmobile app security from the industry perspective.

Provided an excellent discussion of best practice recommendations for ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation for Mobile Applications. Included 5 or more specific recommendations. Appropriately used information from 3 or more authoritative sources.

Provided an outstanding discussion of best practice recommendations for ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation for Mobile Applications. Included 4 or more specific recommendations. Appropriately used information from 2 or more authoritative sources.

Provided a discussion of best practice recommendations for ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation for Mobile Applications. Included 3 or more specific recommendations. Appropriately used information from 1 or more authoritative sources.

Discussion provided some information about best practices for ensuring security for Mobile Applications. Mentioned information obtained from authoritative sources.

Discussion provided some information about best practices for ensuring security for Mobile Applications, but the lacked detail and/or was not supported by information from authoritative sources.

Did not address best practices for security for Mobile Applications.

Demonstrated excellence in the integration of standard cybersecurity terminology into the case study.

Provided an outstanding integration of standard cybersecurity terminology into the case study.

Integrated standard cybersecurity terminology into the into the case study

Used standard cybersecurity terminology but this usage was not well integrated with the discussion.

Misused standard cybersecurity terminology.

Did not integrate standard cybersecurity terminology into the discussion.

Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.

Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries.

Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries.

Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries.

Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.).

Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).

Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.

Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.

Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.

Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills.

No formatting, grammar, spelling, or punctuation errors.

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.

Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.

Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.

Submitted work is poorly executed OR does not reflect college level work.

Overall Score

Homework on IT

Two pages only

Readings from Incident Response & Disaster Recovery “Chapter 9”

1.  Discuss the importance of the after-action review and “lessons learned” documents.  How will these help to improve the BC (Business Continuity) plan?

2.  Develop a list of vulnerabilities that a small business may have in the event of a major hurricane. What strategies and recommendations for business continuity will be appropriate for them?

3.  The use of after-action reviews has been covered in every aspect of incident response and disaster recovery. How will the BC (Business Continuity) after-action review differ from the DR (Disaster Recovery) after-action review? 

4.  There are a number of in-house processes that may need to be handled by outside vendors during BC (Business Continuity) operations, what are they and how do you identify those vendors? Provide examples.

Discussion Response

Respond to the two discussion questions:

(1)

The Belhaven Academic Help page has numerous resources to assist and guide students with assignments and research. It has an array of videos, guides, and tutorials on math, formatting styles, citing sources, Microsoft Word, Microsoft Excel, and Microsoft PowerPoint. There are also links to guides, instructions, and writing workshops. This page seems to be the total package and truly encompasses academic help.

Having these resources in one convenient location is a great asset, and it is a testament to Belhaven’s commitment to each student’s academic success. However, Belhaven’s commitment to Christianity is just as important, and there are many spiritual resources available on the Belhaven Academic Help page that coincide with Belhaven’s mission of preparing students academically and spiritually.

Since it’s been a while that I’ve had writing assignments, I found Zotero, under the Resource Management heading, very interesting. Having a research tool that collects and organizes data into sortable collections will come in handy with writing assignments, and it even creates references and bibliographies!

I also found the resources under the Writing Assistance heading very useful in providing me with new information as well as reminding me of things that I had forgotten. I found the Grammarly tutorial to be helpful. It included far more than just merely checking for grammatical errors. It has additional applications for Chrome, Windows, and Microsoft Office, and it automatically saves all submitted documents in its cloud. I will use it significantly as I continue with my graduate program as well as with work assignments in my career going forward.

(2)

Belhaven’s Blazenet academic help page contains various links to aid students through their journey while in college. Upon reviewing the website and various links, I learned that this website is where people who are enrolled at Belhaven can receive writing assistance. This academic help page will aid students in formatting an APA style paper, as well as, citing references.Also, it aids in formatting an MLA style paper, as well as, citing references. This webpage also has a section that offers tutorials for the 2016 and 2013 versions of Microsoft Word. In addition, Belhaven’s Blazenet academic help page also has resources to help students with the Bible throughout their time at the university. Moreover, the Belhaven’s Blazenet academic help page has a section that contains links for math tutorials if a student is struggling. Subsequently, something I would like to learn on the Belhaven’s Blazenet academic help page is higher level math instead of just Algebra basics and Algebra 1.

A useful resource on the Belhaven’s Blazenet academic help page that will help me during my educational journey is the APA Assistance section. The APA Assistance section contains links that will aid in formatting a paper in APA. It also has videos on how to reference different type of sources in the APA format. When writing a paper, I will be using the APA paper template as a visual guide to show me what my paper is supposed to look like. Additionally, this section will assist me in how to reference different sources in the APA format. This resource would be beneficial with the various writing assignments in this course and throughout my academic career at Belhaven.

Healthcare Hospital Infection Prevention Program

TOPIC: HOSPITAL INFECTION PREVENTION

In this assignment, you will select a program, quality improvement initiative, or other project from your place of employment. Assume you are presenting this program to the board for approval of funding. Write an executive summary in APA Style (850-1,000 words) to present to the board, from which they will make their decision to fund your program or project. The summary should include:

  1. The purpose of the program or project.
  2. The target population or audience.
  3. The benefits of the program or project
  4. The cost or budget justification.
  5. The basis upon which the program or project will be evaluated.

Share your written proposal with your manager, supervisor or other colleague in a formal leadership position within a health care organization. Request their feedback using the following questions as prompts:

  1. Do you believe the proposal would be approved if formally proposed?
  2. What are some strengths and weaknesses of the proposal?

Prepare this assignment according to the APA guidelines

Business Finance and Structure Advice

Write a 350 to 700 word response to the following e-mail:

Dear Consultant,

I am currently starting a comic book store business and developing my business plan. I’m in need of some advice on how to start forming my business. I am not sure exactly how it will be financed and whether or not I want to take on partners. I am interested and willing to learn the intricacies of my options to determine how to best proceed with my plan.

Please recommend one option, the advantages and disadvantages of the option, and possible tax consequences for the structure you recommend?

Respectfully,

John Owner

i litterally only need you to write about why the LLC option is the best for this owner and the advantage and disadvantages of it. you don’t need to discuss business plans or finance options. just let him know why you are reccomending the llc as the best option for a comic book store. 

Finite Cal

Your portfolio manager has suggested two high yielding stocks: The Altria group (MO) and Reynolds America (RAI)  MO shares cost $50, yield 4.5% in dividends and have risk index of 2.0 per share. RAI shares cost $55, yield 5% in dividends, and have a risk index of 3.0 per share. you have up to $9,050 to invest and would like to earn at least $410 in dividends. How many shares of each stock should you purchase to meet your requirements and minimize the total risk index for your portfolio?

Research topic, Media influence on body image

Research topic, Media influence on body image

1.Five  references that could be used for your research paper and include a 1-2 sentence description for each of the five additional references, explaining how they fit with the research topic and the research question proposed. Make sure that these references come from scholarly sources using Argosy’s library resources.

2.A  very detailed outline of what you would like to cover in the intro/lit review of your paper. Write it as an outline and think about what you want each paragraph or section to cover. Paste your references into each section where the information from that article applies to the topic. Below is an example of the outline although the references have not been pasted in yet:

a.Introduction or Statement of the Problem (e.g. Predictors of Depression in Men)

i.Research question (E.g. What factors predict depression in men? For example, age, marital status, family history, stressors).
ii.Why is it important/implications  (E.g. xx% of men are depressed; less likely to seek treatment; if we can identify who is at risk, may be able to direct them to treatment sooner)
iii.Revised hypothesis based on feedback from the instructor

b.Review of the Literature (the following is an example for above topic):

i.Brief description of depression, symptoms, and any unique symptoms for men (Cite articles from which you will obtain this information).
ii.How widespread is it? Stats on depression in general but also stats on depression in men (Cite articles from which you will obtain this information).
iii.List factors that put men at risk for depression (Cite articles).

1.Difficulty communicating distress or sadness (Cite articles).
2.Job/work pressures (Cite articles).

iv.Demographic characteristics (Cite articles).

1.Relationship between age and depression (Cite articles).
2.Relationship between marital status and depression (Cite articles).

3.A 1-2 page description of the sample you would like to use for your study, that provides the answer to the following questions:

a.What sampling technique would you use?
b.Does the sample generalize to the population? Explain why or why not.
c.What inclusion criteria would be used? What exclusion criteria would be used, if any?
d.What ethical issues might be encountered when collecting your information from this sample?

4.Be sure to also submit all your  references  in an APA-style reference page. Be sure to also include an APA-style title page with your submission. Your paper should be at least 2-3 pages long. Make sure you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; display accurate spelling, grammar, and punctuation.