Browse Month: January 2017

Quadrennial Homeland Security Review Policy Statement


Securing the borders is an important task that the county needs to consider though it has not greatly dealt with the security problem facing the country. Texas borders Mexico a country that borders the United States. Mexico is associated with a lot of crimes that usually affects the people in Texas (Guerette & Clarke, 2005). The gangs from Mexico form groups in Texas that provide a hard time to the Texan government and its constituents.  Therefore being on the border requires various measures to be executed to ensure security is maximized and that no more gangs gain entry into the country and further into the country. Various measures can help in handling border security and ensure that any leaks in the borders are dealt with to prevent any mishaps affect that may eventually affect the state.

Cross Country Involvement

The two countries and the Texan county should be greatly involved in various meetings that will help deal with various criminal gangs. Homeland Security should ensure that it call on the Mexican government and law enforcement agencies in Mexico to help them deal with the increasing crime rate in Texas (Longmire, M & Longmire, S., 2008). The cooperation will help the government identify the various tactics that the criminals use and help homeland security to be more effective in finding criminal gangs in Texas. Such criminal groupings eventual move to other states posing problems eventually to the whole country and, therefore, dealing with the root of the problem.

Increasing of Security Checks and Border Patrols

Increasing the workforce at the border is important for the safeguarding of the border. The main issue in increasing security is to ensure that no one accesses Texas illegally especially focusing on criminals from Mexico who are operating in Texas to a small extent. Since Texas County borders, Mexico security should be beefed when compared to other states. The increasing criminal activity associated with the gangs affects the security of Texas, and the killings paint a negative picture on the security agencies. Texas as a county has not much concern for the border about the large numbers of gangs in the county who are a security risk to the constituents of Texas. The ports into Texas are the entry points that form the border points bordering Mexico. Entry points are through land and air.


The legislation is needed in place to support the inclusion of more police officers on the border. This will help in ensuring that the border is secure especially by creating legislation that increases police on the border and helps to ensure that a lot of tools are used especially those that are related to technology including cameras and computers. Technology has proved to capture various things that people would not note and, therefore, using them at the border would increase efficiency in securing it. The legislation would, in dealing with transnational activity involving crime, help greatly in combating crime especially international crime since Mexico is known for the many drug and crime cartels that operate internationally.


Security is a central concern to the county, and, therefore, it should be considered and taken with a great necessity to ensure that no criminals or illegal entries are made into the county. The national government should improve border security in counties that border other counties like Mexico. Texas should, therefore, be considered in being given additional assistance to increase security, and since Mexico has various criminal cartels, the government should focus on providing financial assistance to ensure that the various tools are obtained. Therefore, it is important that the county consider the border issues, and the various ports into the county have loopholes. The loopholes like illegal entry especially involving criminals should be sealed to prevent crime in Texas and in general to America.

Download full Quadrennial Homeland Security Review Policy Statement or Order original paper on any topic at an affordable price.

Public Communication Programs, Processes, Systems, Efforts, and Plans


There are many processes, efforts and various communicational procedures that take place for the purpose of public education. Many processes help in the communication of various risks that affect the public. The risk communicators, therefore, had to go through various efforts like ensuring that the languages used are appropriate and are not imposing to the public. Various efforts are pout in risk communication to ensure that the public understands what is taking place in their environment. The efforts are made in educating the public using seminars or organizing for local meetings with the affected people.  The communication to the public should be clear and concise to the people involved.

An example of a public communication tool is that developed by the World Bank that deals with the privatization programs that will help in mitigating development and development risk. Various approaches are used in the management of risks and even communicating to the affected people who are mostly affected by various environmental hazards. The various approaches are usually in dealing with the agents especially in the release, use and exposure to the various agents. Various efforts and actions are geared towards educating the public in making decisions. The various processes including being open, frank, honest and truthful. The purpose of the various efforts like honesty is to ensure that they listen and understand the public concerns and be sensitive to their needs or grievances. The rules of communication by Covello. Most people may have mistrust against the experts.



Risk Communication

The core principles of the public education are many, include mental, and trust determination theory. There are various efforts that have been progressed by eth government in the event of enraging that the various organizations dealing with chemicals and manufacturing practices educate the public on the effects of the chemicals and whether their lifestyles will be changed in any way (Sellnow, 2009). The government has through various policies and regulations the regulations and laws are set in place by the nation government and in the respective local governments. Therefore, the governments contribute greatly to the welfare of the people in putting the industries into account.  Risk research has been carried out to find out the various risks affecting most publics and how such messages can be communicated to them. Risk communication entails various aspects that provide clarity to the targeted audience and thus makes sure that the affected people get to understand the various impacts such companies may have on them. Some of the aspects are getting the numbers right, informing the public of the meaning of the numbers, explaining the meaning of the numbers, make the public conversant with the past risks that they have accepted, explain the cost versus the benefits associated with the risks, and promote respect towards the public. Lastly, the companies should collaborate with the public to ensure that there are involved in many of the workings of the companies and, therefore, increase transparency.

Theories, Processes and Efforts of Communication to tThe Public

Situation theory publics helps communication towards the intended to be effective.  The theory helps in identifying the stakeholders who should be reached out to and how communication should be carried out especially to the publics. As a result, it clearly identifies the public and then goes forward to determine whom they should be communicated to. The theory has three aspects, which are the extent of involvement, constraint recognition and problem recognition. Information processing and seeking are the core characteristics of the theory used to forecast behavior. The theory, therefore, encompasses communicative practice in dealing with various problems that may arise concerning the publics. The theory helps in making sure that risk analysis and assessment is carried out to ensure that the people understand the various risks associated with any companies operations (Crouhy et al., 2000). The company thus gets to air out the various consequences without possibly reduce the impact of the risks associated with the institutions and organizations.

The heuristics systematic model helps greatly in ensuring that the publics are educated to a greater extent. The various efforts are put into play to ensure that those who educate the public have the necessary information by using the model to predict the behavior of the publics. Another model is the deliberate process model that helps the institution and organizations identify and forecast the public’s motivation and behaviors in processing the various risk messages involved. The model centers various actions and measures that help in processing the risk messages and helping the public to understand the risks associated with the various organizations.

Risk analysis is also carried out to determine the resultant effects of various risk analysis. Risk analysis entails control, evaluation and recognition of a risk (Arvai, 2014).  Most of the areas that focused on public education include public health, geology and earth science, and environment stewardship. Therefore, the companies carry out risk analysis to ensure that they make the public and the government at large understand the various risks involved.  There are many institutions, which are involved in the disseminating important information regarding the various companies and the chemical effects.

The Red Cross organization has many branches globally and deals with related health problems. It has been instrumental in public education specifically in health related matters. The Red Cross is educated people on the various health related matters globally. The Red Cross provides information that is relevant to the communities they operate in. It is mostly centered on various disasters that take place throughout the world and help to ensure that people who are affected by various floods or natural disasters like tsunamis and earthquakes are rescued. Therefore, the Red Cross is a multifaceted organization that helps in dealing in not only dealing with not only health but also rescue and educating the public on various risks. Another approach to educating the public is the crisis and emergency risk communication. It is an emergency awareness program (Vose, 2013).


Most of the models in place and efforts usually help the institutions in ensuring that they predict the various outcomes that may happen when the public get the risk messages. The models and processes help in ensuring that the organizations come out clearing on the various negative impacts and in the prediction of the public’s behavior. As such, the public should be more involved in the decision process especially regarding companies that have extremely negative consequences should they be set up. The government should come up with legislation that is people centered and that required the companies to have the environmentally friendly and health conscious practices that ensure that the publics have little concern on these issues. Companies should, therefore, be accountable to the public in following the laid down procedures by the national government and the local governments in place.


Arvai, J. (2014). Effective risk communication. Abingdon, Oxon: Routledge.

Crouhy, M., Galai, D., & Mark, R. (2000). Risk management. New York: McGraw Hill.

Vose, D. (2013). Risk analysis: A quantitative guide. Hoboken, N.J: Wiley.

Sellnow, T. L. (2009). Effective risk communication: A message-centered approach. New York: Springer.

Riordan Manufacturing

Riordan Manufacturing

o One of Riordan Manufacturing’s largest customers purchases a number of different styles and types of a polycarbonate drinking bottle. The formulation for this

particular bottle style contains Bisphenol A. Due to highly publicized, recent news stories concerning the safety of reusable plastic containers, Riordan’s customer

has advised them that it will no longer be purchasing bottles containing Bisphenol A. Some time ago, the purchasing department found an attractive price on a bulk

purchase of many of the components that went into the manufacture of the bottle. Around the same time, the operations department foresaw a period of unused plant

capacity in the China plant. In order to keep the plant running at peak efficiency, they had the China plant do a number of production runs of the polycarbonate bottle

in the most popular sizes and colors. No one saw an issue in producing the bottles without an existing purchase order given the customer’s history of purchasing large

quantities of these bottles in the past. The bottles are currently being stored at the China plant, but the warehouse space will soon be needed for other orders. The

bottles have not yet been scored with volume markings or the customer’s logo. What can Riordan Manufacturing do with the bottles?
o Riordan Manufacturing uses Huffman Trucking to ship their products all over the United States. With rising fuel costs, several trucking companies have gone out of

business or have substantially raised their rates. Huffman Trucking has innovated a way to stay in business without having to raise their shipping rates for customers.

In turn, Huffman has also picked up many new shipping contracts from other businesses. With the increased business at Huffman, Riordan Manufacturing has noticed a

decrease in their timeliness and customer service. Several orders have been distributed or picked up late, adversely affecting functioning at Riordan. What can Riordan

do to solve this problem? Keep in mind that Riordan and Huffman have a 5-year contract with little room for renegotiation and Huffman continues to have the most

competitive shipping prices in the country.
• A majority of employees at the Pontiac branch of Riordan Manufacturing work at the production level. While the company expects a higher rate of employee turnover for

those positions, they have recently seen a substantial increase in the turnover rate. In turn, production managers have had to increase their time spent interviewing

and training new employees. This affects their time spent managing the day-to-day quality control, sales, and safety aspects of their positions. The managers have

agreed that they must establish a way to better retain their production employees. What can they do?

• Create a 2 to 4-slide Microsoft® PowerPoint® presentation, with detailed slide notes, on your strategic experiment. Incorporate the following into your presentation:
• Present two innovative ways to solve the problem.
• Address the following six changes involved with theory-based planning in your process and presentation:

o Communication of expectations: Base your predictions on theory and include a description of the theory used to generate your predictions.
o Nature of predictions: Predict the trends, rather than the specific numbers.

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

Examining personality requires both large scale and small scale research. Larger research studies may examine the factors that shape personality …….

Examining personality requires both large scale and small scale research. Larger research studies may examine the factors that shape personality through the use of longitudinal and quasi experimental studies of people (Cozby, 2013; Ryckman, 2013). For example, John Bowlby (1983) studied the impact of attachment on personality and behavior by researching prison inmates’ retrospective accounts of their childhoods. Smaller scale studies may also shed light on personality development, manifestation of a disorder, and the impact of administered treatment. Case study research tends to involve in-depth examination of a single or small group of clients. In a case study situation, a researcher may use self report, interviews, and observation in order to shed light on the case, make comparisons with other cases, and draw scientific conclusions (Ryckman, 2013). Similarly, clinical research is often used and may be a very valuable tool for understanding the impact of certain types of treatment. In clinical research, an experimental design may be used where two groups of participants receiving two different interventions are compared (Ryckman, 2013). Which of these methods produces the most valid information in the real world of personality research? Why?  

Course Text: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches


Course Text: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches

  • Chapter 9, “Qualitative Procedures” (pp. 173–202)Creswell guides the reader through qualitative methods and plans. Use this chapter for the Discussions and the Application. Media:
  • “Qualitative Methods: Two Examples” (11:09)Dr. Sreeroopa Sarkar discusses two qualitative research studies. To view this video program, use the media player located at the top of this page.

RSCH 8100 Video Transcript: “Qualitative Methods: Two Examples”


Narrator: Dr. Sreeroopa Sarkar’s research study is an example of qualitative research. Its design was made particularly interesting because of cultural questions and decisions that guided the design process. Listen as she explains.


Dr. Sreeroopa Sarkar: Today I’m going to describe two research studies that myself and Dr. Bonnie Nastasi of Walden University have carried out for promoting mental health among the schoolchildren in the South Asian countries of Sri Lanka and India. These two studies were formative in nature, and it aimed at assisting the mental health needs of the adolescent school students in these two countries and resources available to them to deal with any kind of mental health issues.


The first study was initiated in Sri Lanka. We wanted to test the model in a similar culture, so, as a native of India, I wanted to extend this study on the model that we developed in Sri Lanka and wanted to test it in a similar culture in the neighboring country of India. We expected that India and Sri Lanka has many similarities in cultures.


I’d like to share with you why we decided to carry out these two studies in two different cultures. We have been involved in a sexual risk prevention project with the youth in Sri Lanka, and during our interviews with the young adults, many of the mental health issues that came up such as suicide, alcohol and drug abuse, and so on. For example, suicide rate among the adolescents in Sri Lanka was very high. That was also the case for adolescents in India. Sri Lanka has the highest rate of suicide in the world. And the rate of suicide among the adolescent population, particularly between the age of 15 to 18, is highest in India. We also found out that drug and alcohol abuse is on the rise in both cultures, and there are also incidents of gang activities or criminal activities, community violence, that are affecting the adolescents and the young adults in both countries.


We started looking into the literature, and we also found that there is very limited emphasis on mental health issues in both cultures. There are also very limited resources available. For example, in Sri Lanka, there are only 19 psychiatrists available for a population of 20 million. There are also misconceptions as well as widespread ignorance about mental illnesses and mental disorders, and there are also cultural stigma about mental illnesses in both of these cultures.


In this background, we decided to initiate our first study in Sri Lanka, and for conceptualizing mental health for the purpose of our study, we used three theoretical frameworks. One was Bronfenbrenner’s ecological developmental framework, which emphasizes on the rule of ecology in influencing a person’s development. We also used personal and environmental factors model, which emphasizes the importance of personal factors as well as environmental factors in influencing a person’s mental health. And the third framework that we have used was the primary prevention of mental illnesses through promotion of personal social competencies.


So based on these theoretical frameworks, we generated six major mental health constructs, or variables, that are related to mental health. First was the culturally valued personal and social competencies. And the second construct was social stressors as viewed by the adolescents in that culture. Third was what kind of coping strategies that the youth utilized to deal with major mental health problems and stressors. Fourth was what kind of social resources that are available to the youth to deal with mental illnesses. Fifth was personal and family history that makes an individual vulnerable to mental illnesses, and the last was socialization practices and agents that influences a person’s development.


We realized that using a qualitative research method would be very effective in this formative research stage. We have decided to use the ethnographic research tradition because we were trying to understand mental health from the perspective of the people from two different cultures which are very different from the cultures that we see in the United States. We wanted to learn about the culture from the perspective of the people of the culture. We wanted to get a definition of mental health as the people from that country defined it: how they viewed mental health, how they viewed different mental health problems, what kind of attitudes they have towards mental health. So we felt that ethnographic research method will enable us to get a very culture-specific definition of mental health.


We conducted focus group interviews with the schoolchildren. We started with open-ended questions, and based on what kind of responses we are getting– for example, if they wanted to discuss a particular topic, we also wanted to focus on the particular topic and discuss it with the children in details. I’ll give you an example. When we are conducting interviews with them and we ask them about social stressors, many of the children were very vocal about academic pressure. And we wanted to explore that issue in details, and we asked them more questions about academic pressure. And we found out that there are several factors, such as rigorous examination system in the country, high level of competition, parental pressure for academic achievement, as well as lack of opportunity for literary creation were identified as major stressors by the children.


Another example would be, when asking female students about social stressors in India and Sri Lanka, girls talked a lot about sexual harassment and molestation that they encountered in everyday life. So we are very interested and asked them more questions about that, and we wanted to discuss it in details. We found out that girls are regularly teased by boys on the streets and they’re also molested frequently in the public transportation by men. They identified that problem as a major social stressor for them. We expected that the findings from the studies will help us developing a culture-specific survey questionnaire and intervention tool that we can use with the larger population of adolescent students in both of these countries.


I’ll give you some of the examples of our findings. Some of the characteristics of personal social competencies as defined by the adolescents in that culture included: honesty, hard work, ability to balance between work or play, and respect for elders. Social stressors, as viewed by the adolescents, included: poverty, academic pressure, sexual harassment, family violence, fights between the parents, and divorce of their parents. Some of the coping strategies that they described included: crying; pouting; isolation; listening to musics; or seeking support from family members, from parents, and from friends. Social resources available to the adolescents included: seeking support from family, friends; or seeking support from private tutors who particularly help them in their academic needs. Interestingly, students never discussed getting any kind of support from professionals, such as psychiatrists or psychologists.


Based on our findings from both of these research studies, there are several implications. First, the findings from this study suggested a strong need for mental health services for the adolescent school students in both of these countries. Secondly, based on the qualitative data as well as our intervention data, we expect to recommend to the policymakers of the country several things. We expect to recommend them that they may explore the opportunity for integrating personal social competency promotion, or life skill training, to the children in the schools, such as how to deal with stressors. It will teach them resiliency, or it will teach them how to seek support when they are having some kind of mental health problems.


One of the challenges that I personally had to deal with while carrying out this research was keeping out my personal biases. I am a native of India, and I’m very familiar with the culture of India as well as Sri Lanka, so I had to make sure when I went out there and I was carrying out interviews, I had to make sure that my personal biases doesn’t interfere with data collection or data interpretation. And I think that’s important for any qualitative researchers to remember, that we have to be careful. We have to be aware of any kind of personal biases that we bring in with ourselves into the research. In closing, I would like to say, that as we expected, qualitative research was found very effective for this particular study. We found a very culture-specific definition of the major mental health constructs that we were looking into, and, based on the definition of this construct, we were successful in developing a culture-specific instrument for collecting data as well as– we developed an intervention program that we implemented in Sri Lanka. We hope to do the same in the future in India with the qualitative data that we have collected there.


The Assignment

Qualitative Research Design and Methods

As you did last week, you will begin this week with a general examination of qualitative strategies and methods in this Discussion, along with a comparison of those methods to the quantitative strategies studied last week.

To prepare for this Discussion:


Review Chapter 9 in the course text, Research Design and the “Qualitative Methods: Examples” media segment.

Explain how quantitative and qualitative strategies and methods/procedures are similar and different.

Determine which kinds of research questions would be served by a qualitative strategy of inquiry and explain why.

Generalize about the popularity of qualitative methods in your discipline.

With these thoughts in mind:

Post by Day 3 a 2-to 3-paragraph comparison of quantitative and qualitative strategies of inquiry.

Be sure to support your postings and responses with specific references to the reading(s) and/or media segment(s) and use APA format.

It is time to put on your manager’s hat. This past week you have learned about business and multi-business strategies.

 It is time to put on your manager’s hat. This past week you have learned about business and multi-business strategies. What does the term patching (Pearce & Robinson, 2013, pp. 277–280) refer to, especially when thinking about how this might guide you as a manager to build value in your business operation?

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN


Minimum 200 words

 7. In this week’s unit, you learned the value of CSR and business ethics and or code of conduct. Large corporations are valued by stock price performance and the bottom line. Sometimes this allows for unethical practices in the workplace no matter what employee, management, or executive levels. How much should social responsibility be considered in evaluating an organization’s overall performance from an ethical perspective (Pearce & Robinson, 2013, p. 85)? Please explain and use a contemporary example.

Minimum 20 words

8. This week you have really spent a lot of time learning about strategic control systems. Choose a business whose strategy is familiar to you. What do you believe are the key premises of the business’s strategy? Based upon the key indicators, also known as KPI, which would you choose to monitor and why? How would this help this business competitively?

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN


The Code of Hammurabi

The Code of Hammurabi

Persuasive Writing Assignment (Essay #3)

The Code Of Hammurabi

Consider the works that we have discussed this semester. Select one or two specific works and explain in detail why the work(s) not only had the most significant impact on you, but also why it (they) should have the most significant impact on the rest of us.

In the opening paragraph, it is important that you powerfully express your position in a clear and convincing thesis statement. Keep in mind that your objective is to persuade the reader that this work(s) stood above all the rest. Simply giving a summary of the work does not meet the requirements for this assignment.


Obviously, there should be a strong sense of personal conviction that runs throughout the paper. Cite at least three (3) passages from the text(s) to support your opinions.

Be sure to pay close attention to writing mechanics (grammar, punctuation, transitions, etc.)

Essay Requirements:

Length: 3 – 4 pages, typed, double-spaced
Format: MLA style
Due: See syllabus
• Title your essay (title should capture the essence of your thesis)
• In the upper left-hand corner of the first page: Your name, Course Number, Instructor’s name, Date
• Beginning on the second page, your last name and page number should appear in the upper right-hand corner.
• No separate cover page is necessary.
• Staple pages
• Grade may be reduced if essay is submitted late


The highest mortality rates (deaths per 100,000 people) were reported in New York, Florida,…

1. A health magazine presented results of a recent study that analyzed data collected by the U.S. Census Bureau in 2000. Results reveal that for both men and women in the United States, heart disease remains the number one killer, victimizing 500,000 people annually. Age, obesity, and inactivity all contribute to heart disease, and all three of these factors vary considerably from one location to the next. The highest mortality rates (deaths per 100,000 people) were reported in New York, Florida, Oklahoma, and Arkansas, whereas the lowest were reported in Alaska, Utah, Colorado, and New Mexico. (16 points)
a. What is the population?
b. What is the sample?
c. Is the study descriptive or inferential in nature? Explain.
d. Is the study observational or experimental? Explain.
e. What are the variables?
f. In your opinion what level of measurement was used to obtain data from the variables?
g. Classify all the variables of the study as either attribute or numerical.
h. What parameter best characterizes the risk for each member of the population?
2. Identify each of the following as examples of nominal, ordinal, discrete, or continuous variables: (6 points)
a. A poll of registered voters in Florida asking which candidate they support
b. The length of time required for a wound to heal when using a new medicine
c. The number of telephone calls arriving at a switchboard per five-minute period
d. The distance first-year college football players can kick a ball
e. The number of pages in your statistics textbook
f. The rankings of employees on their job performance
3. Based on your readings, identify and describe – in your own words – the four levels of measurement. (4 points)
4. Construct a frequency distribution table to organize the following set of quiz scores: (5 points)
3 5 4 6 2 3 4 1 4& nbsp; 3 7 7 3
4 5 8 3 2 4 7 10 & nbsp;
5. Construct a grouped frequency distribution for the following 28 scores using a class width of 5. (5 points)
23 20 18 22 12 14 21 23 16 21 22
21 16 18 27 30 17 24 21 27 19 29
25 23 28 24 19 18 &nbs p;
6. Identify the sampling technique used to obtain a sample in each of the following. Explain why you chose the sampling technique you did for each. (10 points)
a. Every 20th washing machine coming off an assembly line is checked for defects
b. District supervisors are selected using random numbers in order to determine annual salaries.
c. Students at a local university are classified according to their major. Then a random sample of 20 students from each major is selected.
d. The first 40 people entering a supermarket are asked their opinion on the price of cooking oil.
e. A state is divided into regions using zip codes. A random sample of 30 zip code areas is selected.

7. Indicate which would be the independent variable and which would be the dependent variable in each of the following:
a. Score on the first test, Final grade
b. Gas mileage, Car speed
c. High school grade point average, Freshman College grade point average
d. Crop yield, Rainfall
8. A math test was given with the following results:
80, 69, 92, 75, 88, 37, 98, 92, 90, 81, 32, 50, 59, 66, 67, 66
Find the range, standard deviation, and variance for the scores.
9. For a particular sample of 50 scores on a psychology exam, the following results were obtained.
Mean = 78 Midrange = 72 Third quartile = 94 Mode = 84
Median = 80 Standard deviation = 11 Range = 52 First quartile = 68
a. What score was earned by more students than any other score? Why?
b. How many students scored between 68 and 94 on the exam?
c. What was the highest score earned on the exam?
d. What was the lowest score earned on the exam?
e. How many students scored within three standard deviations of the mean ?
10. Answer the following:
a. What does it mean to say that x = 152 has a standard score of +1.5?
b. What does it mean to say that a particular value of x has a z-score of -2.1?
c. In general, what is the standard score a measure of?
11. A student scored 70 percent on a test, and was in the 80th percentile. Explain these two numbers.
12. An animal trainer obtained the following data (Table A) in a study of reaction times of dogs (in seconds) to a specific stimulus. He then selected another group of dogs that were much older than the first group and measure their reaction times to the same stimulus. The data is shown in Table B.
Table A TableB

Find the variance and standard deviation for the two distributions above. Compare the variation of the data sets. Decide if one data set is more variable than the other.
13. Answer the following:
a. What is the relationship between the sign of the correlation coefficient and the sign of the slope of the regression line?
b. As the value of the correlation coefficient increases from 0 to 1, or decreases from 0 to -1, how do the points of the scatter plot fit the regression line?

Monopoly Vs Perfect Competition – Answered

Whether a firm is operating under PC or under MONOPOLY the objective or the goal of the firm is to maximize the profits. This suggests rationality on the part of the producer of both the market. In both the models the owner of the firm is also the manager entrepreneur there is no separation of ownership and management in both the models. In both the models profits maximization condition is satisfied when the necessary and sufficient condition are fulfilled.
The product is homogeneous in poor competition while in monopoly the product may or may not be homogeneous. In monopoly the total supply of the product is concentrated in single firm. While under prefect computation there are large numbers of sellers and none of them can influence the price by changing his price.
As PC and monopoly models are traditional models. Accordingly both depends upon the traditional cost concepts and curves. I other word the behavior both the models are explained with the help of U shaped cost curves. Shaped cost curves both in SR and LR.
Such cost curve suggests that from each plant specific level of output can be produced.
Monopoly is often considered to be inefficient compared to perfect competition.
1.Compare and contrast monopoly with perfect completion. Use graphical as well as verbal explanation. (View Sample Answer)
2.List and discuss the sources (reasons) of monopoly inefficiency. (View Sample Answer)
This writing assignment should be three pages. Two pages for paper and one page for work cited.
Would you like help in comparing and contrasting monopoly and perfect competition? has professional writers ready to help you. We provide high quality and original papers that will guarantee you a good grade. Click on the Order Now button below to place your Order.

Demand elasticity

Here’s the question: Between 1950 and 2006, the price of wheat fell dramatically from %5.81 per bushel to $3.40 per bushel. Suppose between 1950 and 2006, the supply of wheat increased substantially due to increase in productivity, shifting the wheat supply curve to the right. In addition, assume that between 1950 and 2006 the income of the average household increased substantially and that wheat is a normal good. With this increase in income,
A. the amount by which the price of wheat falls will be smaller the more elastic the income elasticity of wheat.
B. the amount by which the price of wheat rises will be smaller the more elastic the income elasticity of wheat.
C. the amount by which the price of wheat falls will be larger the more elastic the income elasticity of wheat.
D. the amount by which the price of wheat rises will be smaller the more inelastic the income elasticity of wheat.
E. the price of wheat will be unaffected.
Please explain the answer step by step cuz i’m lost. Thank you very much.

Using the appropriate tables in the text, Required: Determine: a

Using the appropriate tables in the text,

a. the present value of a single $14,000 cash flow in seven years if the interest (discount) rate is 8 percent per year.
b. the number of periods for which $5,820 must be invested at an annual interest (discount) rate of 7 percent to produce an investment balance of $10,000.
c. the size of the annual cash flow for a 25-year annuity with a present value of $49,113 and an annual interest rate of 9 percent. One payment is made at the end of each year.
d. the annual interest rate at which an investment of $2,542 will provide for a single $4,000 cash flow in four years.
e. the annual interest rate earned by an annuity that costs $17,119 and provides 15 payments of $2,000 each, one at the end of each of the next 15 years.

degree of operating leveverage, percent change in profit

Sharda company is considering two different processes to make its product – process 1 and process 2. Process 1 requires Sharda to manufacture subcomponents of
the product in-house. As a result, materials are less expensive, but fixed overhead is higher. Process 2 involves purchasing all subcomponents from outside
suppliers. The direct materials costs are higher, but fixed factory overhead is considerably lower. relevant data for a sales level of 30,000 units follow:

process 1 process 2


sales $6,000,000 $6,000,000

variable expenses 2,700,000 4,200,000

contribution margin 3,300,000 1,800,000

less total fixed expenses 1,925,000 600,000

operating income 1,375,000 1,200,000

Unit selling price 200 200

unit variable cost 90 140

unit contribution margin 110 60


1. compute the degree of operating leverage for each process.

2. suppose that sales are 30 percent higher than budgeted. by what percentage will operating income increase for each process? what will be the increase in
operating income for each system? what will be the increase in operating income for each system? what will be the total operating income for each process?

3. what if unit sales are 10 percent lower than budgeted? by what percentage will operating income decrease fom each process? what will be the total operating
income for each process?

Customer-Focused Approach

Customer-Focused Approach

Paper instructions:
A wholly owned subsidiary of a large American automobile manufacturer from 1984 to 1994, outlines the successful and unique adaptation of a new approach to organizing in the U.S. automobile industry. The organization represents many of the characteristics typified by “Quality of Work Life” programs, and allows you to see the benefits of a cooperative and customer-focused HRM approach. Use the Library or other Web resources to research and answer the following questions:

What aspects of quality of work life (QWL) programs does the experiment at this case study automobile plant illustrate?

How can the case study automobile manufacturer ensure that employees have not only the willingness to take responsibility but also the ability to do so?

In this case, a completely new company was started with considerable autonomy from the larger manufacturer. Why do you think so many large organizations turn to “Greenfield” operations such as this when undertaking major changes in corporate culture and operations? Do you foresee any problems down the road for the larger manufacturer in this regard?

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

Rulemaking Authority of Foreign Administrative Bodies and Their Effect on U.S.

Foreign Administrative Bodies


International trade plays an essential obligation in the prosperity and growth of the United States. Similar to how the open trading among the 50 states of America develops extensive benefits, open trading enhances great benefits at global level.  Trade promotes technology transfer, creates competition, and permits businesses and consumers access to the global best products. This yields to income rise, higher productivity and innovation all around. The foreign administrative bodies are highly involved in regulating international trade operations. The international trade administration is involved in developing export strategies creating limits to the international trade. This include developing rules and regulations that control countries relation in international trade. This paper evaluates how the foreign administrative bodies’ rulemaking authority influences the US global businesses.

The Foreign Administrative Bodies’ Rulemaking Authority Influences the US Global Businesses.

The foreign administrative bodies’ authority to make rules regarding international business gives them the ability to control the international business. This implies that they can develop a role to favor trade relation between countries in a certain region and to stop malicious business act among members of countries to be involved in trade agreements. They are basically involved in setting international trade policies that should act as a guidance to business operation among different countries. This simply means that the foreign administrative bodies with authority to make laws can highly influence international trade in the United States. They set trade requirements, and thus, they highly influence what can be exported to certain countries whose global business operation they protect. This include the procedures to be followed to enhance international business relation, the quality standard of exports and imports in different countries.

The international regulation cooperation is important to the US government for two main reasons. First it assists the regulatory agencies of the US attain their missions of statutory regulatory domestically. Actually, in some aspects such as drugs and food safety regulation, where the biggest portion which are US imports, participation and awareness in processes of foreign   regulatory participation might be important to guarantee the safety of the goods getting into the US market. International regulatory cooperation can also eliminate non-tariff barriers to exports and trade, enhancing U.S. competitiveness and global commerce. Furthermore, the international regulatory cooperation benefits are consistent. This implies that they can frequently be employed in unison (McCarthy, 2011).).

Although the global regulatory cooperation demonstrated some advantages to the country, it still create some key barriers to the US international trade, both practical and legal barriers. A number of agencies in the US claim that with global regulatory cooperation, they lack the constitutional power to constitute international impacts when making governing decisions. High level leaders and agency officials demonstrates that the foreign administrative bodies gives them low priority since it limits the visibility of their success. Information sharing legal restrictions can hinder cooperation at international level. Agencies coordination in the government of the United States is a challenge, especially for regulatory agencies independency in order for agencies to center on competitiveness and trade are not permanently aware of the other federal regulators activities (McCarthy, 2011).

TTIP also play a major part in enhancing cooperation between nations. These bodies set rules that enhance the growth of International Corporation and also eliminate any form of acts that would results malicious practices. They set production standards for goods to be traded in certain international. The international trade administration empowers the U.S. industry competitiveness, promote investment and trade and guarantees fair trade via the rigorous trade agreements and laws enforcement. It operates to enhance global business settings and to assist U.S organizations contest at abroad and home market. It assist in supporting the national export and recovery agenda initiated by President Obama (Stewart, 2015).

The rulemaking ability of the foreign administrative bodies defines a better business environment for the US in the international market. For instance the ITA in the US is structured into three different though complementary units of business. They include the unit of global market, the unit of industry and analysis, and the compliance and enforcement unit. The global market unit integrates the ITA’s regional and country experts, domestic and overseas field stand and particular programs of trade promotion to offer the US companies full particular country export suit promotion services as well as advocacy to market access, while indorsing the US as an investment destination.  The analysis and industry unit unites the ITA’s economic experts, trade and industry to advance US industry competitiveness via the execution and development of investment policies and international trade as well as promotion techniques. The analysis and industry leverage ITA’s association with services and manufacturing industries to raise U.S. exports. The compliance and enforcement unit promotes the responsibilities of ITA to enforce the trade laws in the US and guarantee compliance with negotiated trade agreements for US industry (Trade, 2015).

The foreign administrative bodies also develop rules to protect country’s local industries from facing unhealthy competition from the foreign investors and traders. This is done by developing laws such as antidumping laws that restrict the prices of imports into a country selling substitutable goods. This protect the local industries from facing competition from companies that can manage to sell their products at cheaper prices. The bodies’ administrative role give them the power to control the pricing of foreign goods (Edwards & DeHaven, 2009). This gives the United States a great advantage in different foreign markets in the world. This it does not only protect the local countries with unhealthy completion, but also the US products competition over other exporters from countries with low production cost. For instance, production of an electronic product in China would be cheaper as compared to production of a similar product in the US. In this regard, without prices regulation, exporting this product to another country the two producers would recover their production cost and profit. Thus, the product imported from US will be expensive than a product imported from China and thus this would make most consumers to prefer the China manufactured product. However the antidumping laws may force China produced product to raise their prices to prevent unhealthy competition with local companies, an aspect that benefits other exporters.


The foreign administrative bodies’ ability to make rules gives them a great ability to influence the United States global business operation. The bodies can set rules that can positively or negatively influence business operation in the United States. However, based on the above analysis, the bodies have demonstrated that their rules have highly enhanced the US global business operations. Although there are a few limitations, their ability to make global business rules have highly facilitated positive business relation between different countries.


Edwards, C., & DeHaven, T. (2009). International trade administration. The Federal Government. Retrieved from< >

McCarthy, M. (2011). International regulatory cooperation, 20 years later: Updating ACUS recommendation 91-1. Retrieved from <>

Stewart, R. B. (2015).  US administrative decision making procedures and international regulatory cooperation. Retrieved from<>

Trade. (2015). About the international trade administration. Retrieved from <>


Film Proposal Essay


This film is created by the DMX family, one of the best film writers and directors within the California region. DMX has been in the film industry for a very of close to ten years. The unit has been successful in its previous script writing and it has even won three awards. The first award was awarded as the runners up in script writing and later two awards were won as the best script writers in California. Some of the scripts that were previously written by DMX family have featured on some of the local television stations due to the message of the contents and the quality of the plays. Moreover, the level of creativity has been appreciated in the past not only by the producers but also by the fans that enjoy watching the plays. DMX level of creativity and dynamism goes beyond the expectations of the viewers because a lot of research is done before a play is fully composed. This unit also derives its creativity from watching a lot of plays especially on the national theatre as well as getting ideas from the daily occurrences that happen in the society.

Title of the Film

The film has been given the title “love infidelity”. The title gives a brief explanation about what the film is all about since it primarily focuses on the infidelity that most families go through in this century. The film is all about three young men who are married to very beautiful wives whom they love so much. One of the men is a banker, the other one is a basketball player while the third one is a taxi driver. All the three men are never at home during daytime due to the tight schedule that they go through on a daily basis. Their wives on the other hand are equally employed with an exception of one who runs her personal business venture within the city.. Coincidentally, the three wives are all cheating on their husbands with three other men. Every woman creates for both the husband and the “side dish” almost on a daily basis. The women find time to hang around with their other men either during the daytime, or later in the evening before they drive back home. Once they get home, they give their husbands the full attention that they need as if nothing had just happened before they got back home. The husbands on the other side are non-suspecting of the foul play by the wives. In the long run, the tricks played by these beautiful women come crashing when their husbands learn of the dirty games the women have been playing behind their backs.  The expose puts the marriages through turmoil for a very long period until that point when they all decide to file for divorce papers because the marriages cannot work anymore. The “side dishes” also disappear once they realize that the women were hanging out with them yet they were married. The end result is that the children are left in such a confused scenario where they have to live without the care and love of both parents.


The budget of the film is expected o be a little expensive considering that the some scenes will have to be shot in some of the five star hotels within the city. Moreover, the film will have to be shot within a span of one week for it to be complete. The estimated amount needed for the entire process will be at least $ 250, 000. The money will be used for various purposed during the shooting process. For instance, part of the cash will be used to settle rental fees for the hotel rooms that will be used by the crew members for the one week period. Additionally, part of that money will be used to cater for the computer graphics and imagery. The cameras that will be used during that process will be hired using weekly rates. Apart from that, the cash will also be used for talent and marketing purposes so that the film can able to sell to the end co0nsumers once it will be completed.

Film Contract

The contract to this film will be guided by the following terms and conditions.

The writer of the script will be engaged in the in all the production stages of the love infidelity film.  The producer should be in agreement that the writer be included in the production stages from the star to the end. The producer should also agree that his work will be done according to the stipulations of the terms and conditions of the agreements.

The creator, DMX family hereby gives the producer, Doughty producer the position of being the executive producer of the love infidelity film. Both parties agree to play their roles as per the already mentioned agreements

Download full film proposal essay or order original essay at an affordable price. 

Contract Clause – Dispute Resolution Clause

Contract Clause


The contract clause to be considered in this case is dispute resolution clause. Dispute resolution clause is a section in a contract or agreement that sets out the techniques for solving disputes between two or more contractual parties. The agreement scope is resolute in clause drafting. The dispute resolution clause requires to be unambiguous and clearly drafted. This highly determined if the clause can be used to resolve any contractual conflict or can just be dismissed as irrelevant due to a high level of ambiguity. A good dispute resolution (DR) clause constitutes of contingent in what the parties anticipate to attain from the inclusion of clause of such kind in their agreement. The DR clause need to forestall future issues and efficiently have provisions which resolves the issue satisfactorily in a way that is advantageous to both parties. Therefore, a suitable DR clause will be founded on a different variables which include the parties’ relationship and interest, the contract nature and subject matter and the respective bargaining power of the parties.  In this regard, DR clause need to be deliberately drafted, instead of routinely, with every contract customization in order to attain the most desired outcome of the parties. Thus, there is no any single DR clause which can handle all agreements (Bihancov, 2014).

Legal Issues regarding Dispute Resolution Clause

According to Bihancov (2014), a suitable DR clause must be enforceable, be a condition model to litigation, be certain and clear as to the process and mechanism to be followed, be able to foresee the issues that might arise as far as possible and be able to preserve the association of disputing parties. Different to arbitration, there is basically no basis of legislative for an agreement enforcement to mediate. Thus, a good DR clause which integrate processes of dispute resolution for instance mediation must be created to address the enforceability needs, else the insertion of a clause of that nature is objectively purposeless. The DR Clause enforceability guarantees that parties try to perform their duties under the DR clause prior to considering litigation. The probable outcomes from obligations of breaching under the DR clause gives incentives to try to resolve a conflict without litigation.

An enforceable DR Clause should not expel the court’s jurisdiction, but instead it should state clearly that the process of dispute resolution is a situation practice to litigation. This clause must be clear on the procedure to be followed to resolve a dispute and the strategies to be used to choose a third party to assisting in resolution process. The clause must also provide a clear steps to be taken in case there will be no a compromising position attained with the intervention of the third party. The clause must foresee all possible problems that they may occur which may result into unresolvable disputes in the future. Problems definition and DR clause drafting must be done to suit the expected problems which will highly be determined by the interest of individuals needing protection and representation as well as the agreement. This is a very extensive scope that expects any probable problem that include contract breach, subject or validity matter associating to the agreement, and contract termination. Finally, an enforceable clause need to enhance the preservation and maintenance of the contractual parties’ relationship. Designing the dispute progress via a suitable DR clause might assist the parties in preserving their association and finding it to be more valuable as compared to the matter of the dispute (Bihancov, 2014).

Application of Dispute Resolution Clause in Real property Management

In real property management, disputes are common between the landlord and the tenants based on different aspects. These aspects include the use of the property, the rent payment, property maintenance, property lighting, and the shared utilities among other disputes. Basically, the tenant and the landlord may develop a contract on how to resolve their issues. The contract may be drafted by the landlord and a tenant may be required to sign upon agreement. In this case, signing of the contract implies that the tenant agree to be guided by the structured contract. In case of unresolvable dispute, both the tenant and the landlord will employed the dispute resolution clause to identify the third party to assist in resolving the issue. The third party will then review the contract that binds the two and listen to the case. In this case, the third party will try to assist them resolve the case. In this case, the two parties will be anticipated to compromise to reach an agreement. The DR clause will be used to ensure that the dispute is settled without destroying the association between them, since they both need each other. In case the problem is not resolved even with the aid of a third party. In case the problem even with the aid of the party, the dispute resolution clause, the clause should guide on how they two can settle their issue in a litigation. However, this will try to be avoided by ensuring that the clause addresses all problems that can occur between a landlord and the tenant or a buyer and a seller in case the property is being sold (Scott, 2014).


Bihancov, A. (2014). What is an example of a good dispute resolution clause and why? Australian Center for Justice Innovation Civil Justice Research Online, 2, 1-19

Scott, M. (2014, 14 Jan). Dispute resolution in real estate contracts. Retrieved from <>

Order original paper at an affordable price. 

Smallpox Biological Attack Dissemination Strategies

Overview of the Threat

Smallpox is a contagious, acute, and most cases fatal diseases that is caused by an orthopozvirus variola virus. It symptoms include body and head aches, high fever, and in some cases vomiting. This is followed by a unique rash that spread in the body and eventually pus-filled blisters and bumps which scab, crust and fall off approximately three weeks after, leaving a bumpy scar. Although most people infected by the virus recover, the disease can cause 30% death to the total number of the infected individuals. Majority of survivors are left with permanent scars on most parts of their skin particularly face while some turn blind. There is no yet any treatment for the disease though there is vaccine. The only possible measures are drugs to control fever and antibiotics to prevent secondary bacterial infection. However, research is going on to establish possible cure for the disease (CDC, 2009).

Smallpox is spread through fairly and direct prolonged physical contact. The virus can also be spread via air in enclosed environment such as trains, buses, and buildings. However, it can also be spread via direct contact with contaminated object that include clothing and bedding or infected fluids from dead bodies. The disease is infectious during the fever onset and turns to be more contagious on rash onset. One remains contagious until the last scab of the disease falls off. The disease has incubation period of about 12 days. Previous research demonstrates that administration of smallpox vaccine within 4 or 3 days after exposure could substantially reduce the disease severity or abort the disease despite of the immunity level of an individuals. The disease was said to be eradicated in 1980 though the United States government has been taking precautions regarding the possibility of its use as a bioterrorist weapon since 2001 terrorist event in the country (CDC, 2009). The current threat should thus be taken serious and preventive measures employed. The possible means of spreading the virus is through air in enclosed settings. Therefore the public should consider avoiding mall and other enclosed regions one week from now.

Prevention of Mass Hysteria within the Population

Mass hysteria refers to swift development of heighted anxiety and fear that translates into immense disruption to the activities and behavior of the involved individuals. Mass hysteria can be very destructive and thus, it should be prevented. The best way to prevent mass hysteria is by identifying the best channel to alert the public about the threat and the right message to give structured in the right way (Balaratnasingam & Janca, 2006). Therefore, the government should ensure that this information is not reported carelessly by the media. Instead, the government should call for a media briefing and address the Los Angeles’ state and the nation in general.

Download full research paper on smallpox biological attack Or Order original paper at an affordable price. 

Ethics in Action Scenario Review

Ethics in Action Scenario

According to respondeat superior, principal or employer has legal role for the agent or employee wrongful act if this act happens in the agency or employment scope. This is irrespective of whether the act was reckless or accidental. Based on this provision, the employer has an ethical obligation to take preventative or corrective action if he or she know that an employee poses danger to others. Being the employee commander and supervisor, an employer has the ability to control the employee’s move and actions through supervision and tight jobs scheduling. Moreover, employers have been provided with the rights to develop the organization policies and action measures to be taken in case one fails to act based on the polices and the identified employees code of conduct. Thus, employee is supposed to rule the employees’ behaviors and to discipline any employee who poses danger to others (Duffy, 2008).

Although the employer is the principle of the employment place, employees also have rights that protect them from any form of mistreatment or unjust dismissal or unjust punishment. This right provide them with an opportunity to contest any form of mistreatment from their employer. In this regard, the employer can never interdict or discipline the employee with simple speculations. Just like any other litigation that needs evidence and proof, the employer need to have enough proof before taking any action. In case the employee is suspicious of the employee’s action, ability or plan to cause any danger to others, the employer has the responsibility of carrying out an investigation, or a close monitoring to prevent the danger from taking place. In addition, the employer should also do own investigation to obtain enough prove to be able to discipline the employee as required. However, the suspicion is enough to employ measures to ensure no danger is caused by the employee. The employer may never have proof, but that only prevent the employer from accusing the employee and punishing the employee for any mistake. However, the employer must take precautions to ensure that the suspicion does not come true and cause harm to employees. The proof provides the employer with the right to punish the employee while the suspicion only pushes the employer to investigate and employ measures to prevent any form of suspected danger (Duffy, 2008).

The employer has an ethical duty to take preventive or corrective action to all employees in the company and the customers who are attended by the employees as well as the surrounding community. The employer has a role to ensure employee safety in their work place. According to the law, the employer should protect its employee from any form of discrimination and harassment. In this regard, the employer should ensure that the environment is conducive enough for all workers environment. The employer is also responsible of protecting the employees against sexual harassment which is a form of discrimination (SHRM, 2014). Employees have the right to equal treatment and should not be discriminated based on their gender. This can only be assured by the employer by enhancing good supervision and scanning the employees conduct before employment. Good work policies and code of conduct should also be employed to enhance promote good behaviors in the working environment.

Employer also has a duty to the society to ensure that he act for the best interest of the society. This is defined as utilitarianism theory where the employer is demanded to act for the best interest of the society irrespective of whether the society best interest will interfere with the company’s wellbeing (Bilych, 2014). However based on the profit maximization theory, the employer is entitled to do all that is possible to maximize the profit of the company. However, this should be done without interfering with the rights of the employees or the best interest of the society. In this regard, an employer is needed to balance the situation to ensure that the company maximizes on its profit, ensure that the society interest is satisfied and that the workers’ rights are effectively employed in its operation. Thus, the employer has ethical obligation over the society, the workers and company’s wellbeing (Hussain, 2012).

In this case, an employee is involved in sexual assault during the working hours. However, the case does not clearly state whether this happens in the workplace or outside the workplace. In case this happened in the workplace, the employer will definitely be responsible since the employer has ethical obligation of ensuring anybody in the work place is safe. However, if this happened outside the workplace, the employer never had control of the employees’ acts outside the workplace. However, if they were involved in work mission at the place where the act took place, the employee is surely responsible under the respondent superior doctrine. On the other hand, the employer may not be able to force moral behaviors in an employee and thus, the employer may not be able to control the situation and thus, he or she may not be liable (Women UN, 2012).

There are a number of torts demonstrated in this case. They include the intentional tort of battery committed by the employee. There is also a tort of negligence where the employer neglected the role of supervision, an act that resulted to the sexual assault.

In this case, an employee of XYZ is involved in sexual assault which is definitely an act away from the employee’s job description. In this regard, it is clear that the employee was not working for the interest of the employer but for personal interest. However, the act takes place in the jobs regular working hours which means, the act happened when the employee was entitled to employment role and maybe to customers who anticipated good services as directed by the company. The ability to be involved in such a crime during working hour demonstrates poor supervision and thus a fail to the employer’s responsibility. With supervision, this could have been prevented. In this regard, both the employee and the employer has a liability to the crime.



Bilych, G. (2014). The theory of justice and profit maximization. Business and Economic Research, 4(1), 188-210.

Duffy, J. (2008). Prevention and correction of retaliation in the US workplace. Management Practices Group Best Practices Series. Retrieved from <>

Hussain, W. (2012). Corporations, profit maximization and the personal sphere. Economics and Philosophy, 28(3), 311-331.

SHRM.  (2014). What are an employer’s obligations under California law with regard to sexual harassment prevention? Retrieved from <>

Women UN. (2012). Employer obligations under law. Retrieved from <>

Order original Ethics in Action Scenario Review at an affordable price. 

Technologies in Department of Homeland Security Cyber Security Division

Technologies in Department of Homeland

Department of Homeland Security plays a big role in strengthening the security of America. One of the branches of the Department of Homeland Security is Cyber Security Division. Cyber attackers pose a big threat not only to the United States government, but also to private organizations. As the use of internet technology continues to rise in critical infrastructure sectors, many people aim to gain profit from it through hacking, espionage, and many other tactics. In order to prevent negative impacts that may arise from cyber attacks, the United States needs to enhance the security and resilience of its Internet system. Cyber Security Division of the Department of Homeland Security strives to promote cyber security through application of advanced technology (United States Department of Homeland Security, 2015b).

The mission of Cyber Security Division is to enhance security and resilience of America’s critical information infrastructure and its Internet systems by fulfilling a number of objectives. First, Cyber Security Division seeks to develop and deliver new technologies and techniques that will enable the Department of Homeland Security and the United States to protect its current and future infrastructure against cyberattacks. Second, Cyber Security Division aims at conducting and supporting technology evolution (United States Department of Homeland Security, 2015b).

Third, Cyber Security Division leads and coordinates research and development to improve the security systems of the internet in collaboration with both public and private agencies. Generally, Cyber Security Division intends to improve critical vulnerabilities that exist in the cyber security landscape including internet infrastructure security, critical infrastructure resources, national research infrastructure, leap-ahead technologies, cyber security education, identity management, cyber forensics, and software assurance. Cyber Security Division is adequately prepared to fight the next-generation cyber threats such as digital provenance and enterprise-level metrics.

In order to accomplish its mission, Cyber Security Division applies various forms of modern technology as a way of protecting the United States’ critical infrastructure systems and the Internet from cyberattacks. The three technologies employed by Cyber Security Division include mobile apps archiving technology, Federated Malware Analysis System, and AMICO and ZeroPoint technologies. Cyber Security uses these technologies well and this explains why many cyberattack plans on the United States internet systems are detected before they are executed.

The Department of Homeland Security developed mobile apps archiving technology purposely to track copyright violations in mobile apps across various applications available in the mobile app market such as iTune, Google Play, and Amazon. Currently, the Cyber Security Division uses mobile apps archiving technology to secure mobile applications by using it to conduct cyber-crime investigations, infrastructure defense, and forensic techniques. The main advantage of mobile apps archiving technology is its ability to discover approximately 19, 000 apps across Android and Windows app platforms that associated with copyright infringement (Kimery, 2015).

One major disadvantage of using mobile apps archiving technology in preventing cyber attacks is high cost associated with its implementation. Since the Cyber Security Division began to use mobile apps archiving technology, the rate of e-crime in relation to copyright infringement in the United States has greatly reduced. This is a clear indication that mobile apps archiving technology is used well by the Cyber Security Division (Kimery, 2015).

Download full paper on Technologies in Department of Homeland Security Cyber Security Division Or Order original paper on this or any other topic at an affordable price.

Intelligence Gathering And Informational Sharing Within Al Qaeda

Intelligence Gathering

Al-Qaeda, a global terrorist network, was founded by Osama bin Laden more than ten years ago. This terrorist network remains a major threat across the United States, Middle East, and Africa. Al-Qaeda’s leaders understand that they are being targeted by the United States government. For this reason, they often use every means possible to share information and gather intelligence in order to make necessary preparations on how to fight their enemies whenever they strike (O’Neil and Gray, 2011). Traditionally, Al-Qaeda largely relied on the local population to gather intelligence. In addition, the terrorist network used basic communication strategies such as face-to-face communication to share information (Global Security, 2015).

However, with technological advancements in the contemporary world, Al-Qaeda now uses technology to share information and to gather intelligence. Moreover, Al-Qaeda currently implements various technological concepts similar to those employed by the United States such as, communication networks, fusion centers, information sharing environment (ISE), detection tools, and surveillance capabilities. Al-Qaeda is unconcerned about ethics and it unethically employs technology in its attempt to attack the United States and its allies. The United States has powers to employ technology in similar ways as a strategy towards defeating Al-Qaeda (Global Security, 2015).

The five main technological tools used by Al-Qaeda with regard to information sharing and intelligence gathering include mobile phones, Skype, emails, various websites on the Internet, and different forms of media such as television, radio, and newspapers. According to Theohary and Rollins (2011), Al-Qaeda largely uses mobile phones, emails, Skype, and the media to spread terrorism-related information and to gather intelligence from their sympathizers distributed in different countries globally. In addition, various websites on the internet provide very good platforms where Al-Qaeda delivers threats that are meant to instill fear among the United States citizens and their allies.

Al-Qeada also uses videotapes to disseminate horrific images of their actions and attacks to members of the public to render them helpless. Moreover, Al-Qaeda leaders spend their time examining national websites in order to gather intelligence that can assist them to stay safe from attacks planned by the United States. Since counterterrorism plans are sometimes documented in various forms of media, Al-Qaeda currently find the radio, newspapers, and television to be very good sources of intelligence gathering (Theohary and Rollins, 2011).

In order to Al-Qaeda to be successful in implementing their attack plans on America, they have to maintain a status quo which is only possible through rigorous recruiting, resource acquisition, training, surveillance, targeting, communication, attack, and spread of propaganda (O’Neil and Gray, 2011). The most important component on the list is communication. As the United States used network technologies to facilitate effective communication in order to counter terrorism, Al-Qaeda employs the same strategy including mass media and the internet to spread messages of attack. The group has a strong multi-national network that involves Islamic militant in Kosovo, Afghanistan, Eritrea, Germany, Somalia, and Algeria, just to mention but a few (Global Security, 2015).

Download full paper on Intelligence Gathering And Informational Sharing Within Al Qaeda or Order original paper on any topic at an affordable price.

Finance P6-17 Midland Utilities, P6-22 & P6-5 U.S. Treasury securities

P6-17 Midland Utilities has outstanding a bond issue that will mature to its $1,000 par value in 12 years. The bond has a coupon interest rate of 11% and pays interest annually.
a. Find the value of the bond if the required return is
(1) 11%,
(2) 15%, and
(3) 8%.
b. Plot your findings in part a on a set of “required return (x axis)–market value of bond (y axis)” axes.
c. Use your findings in parts a and b to discuss the relationship between the coupon interest rate on a bond and the required return and the market value of the bond relative to its par value.
d. What two possible reasons could cause the required return to differ from the coupon interest rate?

P6-22 Bond – Par Value – Coupon Interest Rate – Years to Maturity – Current Value
A – $1,000 – 9% – 8 – $820
B – $1,000 – 12% – 16 – $1,000
C – $500 – 12% – 12 – $560
D – $1,000 – 15% – 10 – $1,120
E – $1,000 – 5% – 3 – $900

a.) Calculate the yield to maturity (YTM) for each bond.
b.) What relationships exist between the coupon interest rate and yield to maturity and the par value and market value of a bond? Explain.

P6-5 Nominal interest rates and yield curves: Are recent study of inflationary expectations has revealed that the consensus among economic forecasters yields the following average annual rates of inflation expected over the periods noted. (note: Assume that the risk that future interest rate movements will affect longer maturities more than shorter maturities is zero; that is, there is no maturity risk.)
Period Averages Annual rate of inflation
3 months 5%
2 years 6
5 years 8
10 years 8.5
20 years 9

a) If the real rate of interest is currently 2.5%, find the nominal rate of interest on each of the following U.S. Treaury issues: 20-year bond, 3 month bill, 2-year note, and 5-year bond.
b) In the real rate of interest suddenly dropped to 2% withouth any change in inflationary expectations, what effect, if any, would this have on your answers in part a? Explain
c) Using your findings in part a, draw a yield curve for U.S. Treasury securities. Describe the general shape and expectations reflected by the curve.
d) What would a follower of the liquidity preference the theory say about how the preferences of lenders and borrowers tend to affect the shape of the yield curve drawn in part c? Illustrate that effect by playing on your graph a dotted line that approximates the yield curve without the effect of liquidity preference.
e) What would a follower of the market segmentation theory say about the supply and demand for long-term loans versus the supply and demand for short-term loans given the yield curve constructed for part c of this problems?

Click here to have a similar paper done for you by one of our writers within the set deadline at a discounted

Mass Casualty Incident and their Psychological Impact


Mass-Casualty Attacks

Bali Nightclub Bombings, Indonesia (2002)

Bali Nightclub bombing is an incident that took place on 12th of October 2001. Two bombs blasted a few minutes past 11 pm on Bali Island in Indonesia. The blast completely destroyed two bars in the Kuta Beach in the holiday resort in the tourist district. The explosion resulted to the death of about 202 individuals who originated from 21 different nations. In this case, over 300 individuals were also injured. Tourists were the most affected individuals in this blast. The injured were assisted by a number of volunteers who took a number of the casualties to various clinics and hospitals on Bali. Most of the casualties were treated at Sanglah General Teaching Hospital at the Bali largest hospital. Initially the casualties were taken care of by the hospital staffs as well as the volunteers. However, there was reinforcement in terms of the medical personnel from different hospitals in Indonesia and international hospitals (Brookes et al., 2014).

Most individuals who were directly affected by the Bali bombing were psychologically affected. They witnessed a lot of unfolding which include the death of their friends or other people who they were faming fun with. They also experienced injuries and fear of death. Some got unconscious and even lied next to dead people who were only pronounced dead in the emergency room. Moreover, there were no paramedics to give them any good attention and thus, the incident created tension, confusion and uncertainty. In this regard, most directly involved individual were anxious and they most suffered from posttraumatic stress disorder later on. Among the common symptoms demonstrated by these individuals include nightmares, intrusive memories, development of negative thoughts regarding tourisms, change of emotional reactions, and reacting to any small sound that demonstrate danger in their surroundings and the feeling of insecurity (Stevens et al., 2013).

The incident also impacted those that are indirectly affected by the incident. This includes family members, friends, colleagues and countrymen of the victims. Some of these psychological impacts include development of touring fear, development of stress based on the need for money to assist with treatment and to assist the victims related to them to receive proper treatment as well as proper counseling. They also suffered from fear of uncertainty and thus, turning to be anxious since no one was sure of the fate of their beloved ones. The family members experienced a state of confusion due to lack of exact information regarding the situation or the status of their loved ones. Accepting the new life after the incident which includes living without a family member, friend or colleagues for those that lost their loved ones and living with the injuries impacts and disabilities for those who survived the attack also resulted to the development of stress and to some extent depression (Brookes et al., 2014).

Basically, the treatment of each victim depends on the specific injuries that a patient incurred. However, it is important to realize that all individuals who were directly involved in the incident were traumatized in one way or another. In this regard, apart from the medical or physical treatment, the victims will require psychological therapy that will enable them to overcome the psychological problems that developed as a result of the incident. This will also help them accept the new changes that came about as a result of the incident, and accept the new normal. This includes any form of disability or loss associated with the incident and that the victims or the family members have to live with. Thus, a continuous therapy would be highly required among the incident survivors and their family members to assist them overcome the shock, to heal from PTSD and other psychological conditions, and also to ensure that their life perception is not highly influenced by the incident.

Natural MCI: Tsunami, Indian Ocean (2004)

Indian Ocean Tsunami took place on 26th of December 2004. The Tsunami was initiated by an earthquake which was believed to contain 23, 000 energy of Hiroshima-type atomic bombs. The earthquake had 9.0 magnitude quakes, with its epicenter situated in the Indian Ocean close to the Sumatra west coast. The aggressive movement of the tectonic plates of earth displaced a huge volume of water, passing strong shock waves in all directions. The rupture was over 600 miles long, relocating the seafloor a few yards vertically and horizontally by 10 yards. This resulted to movement of rock measuring trillions tons resulting to the biggest magnitude earthquake in a period of 40 years. The Tsunami was very destructive. It is approximated that it caused the death of 230,000 people. There was also an extensive destruction of properties where more than 500000 individuals were left homeless where approximately a third of the casualties were children. The Tsunami created a great change in the life of people living along the Indian Ocean coast with destruction of properties, loss of life and injuries among other changes.  People displacement resulted to scattering of families and thus, most people were left without families (Frankenberg et al., 2008).

The Tsunami created great distress to the victims since they lost a lot in life. The loss of life left most children without parents, parents without children, villages completely destroyed. This resulted to great trauma since most of them had to be relocated and to continue with life without what they lost. The main psychological symptoms for the victims were stress and depression. Other symptoms include panic disorder particularly among children, schizophreania, posttraumatic stress disorder, and anxiety or fear of the unknown (Agustini & Matsuo, 2012).

The incident will also impact the psychological health of the victims that were not directly affected such as friends, family members, neighbors and others with one or more association with the victims. One of their major psychological conditions includes stress and anxiety due to uncertainty regarding the condition of their friends, families and their close associates. In addition, the family members will experience the fear of the unknown due to the uncertainty of the news that they are most likely to receive regarding their loved ones (Frankenberg et al., 2008).

The long term treatment plan for the victims include assisting them with material needs, social needs, and physical needs before considering providing them with psychological needs. Basically psychological wellbeing is enhanced by providing the victims with a new life, a place to live in; food, medical attention and social or new community where one can fell secured. After all this, the victims will be engaged in a psychological therapy which will include personal counseling, group or community therapy, and family therapy based on individual losses. This is a process that will take place for a while to ensure that victims have accepted what happened, their losses and that they have accepted it and that they are ready to move on.



Agustini, E. N., & Matsuo, H. (2012). Children and Adolescents-Survivors of the 2004 Indian Ocean Tsunami: Prevalence of Long-Term PTSD and Coping Strategies (chapter 3). doi: 10-5772/51478

Brookes, G., Pooley, J. A., & Earnest, J. (2014). Terrorism, trauma and psychology: A multilevel victim perspective of the Bali bombings. Routledge

Frankenberg, E., Friedman, J., Gillespie, T., Ingwersen, N., Pynoos, R., Rifai, L. U., Sikoki, B., Steinberg, A., Sumantri, C., Suriastini, W., & Thomas, D. (2008). Mental health in Sumatra after the Tsunami. American Journal of Public Health, 98(9), 1671-167.

Stevens, G. J., Dunsmore, J. C., Agho, K. E.,  Taylor, M. R., Jones, A. L., Ritten , J. J., & Raphael, B. (2013). Long-term health and wellbeing of people affected by the 2002 Bali bombing. Medical Journal of Australia, 198(5), 273-277.

Order original paper on this topic or any other topic at an affordable price.


Research Areas of Emphasis in Professional Psychology

Read the “Research Areas of Emphasis in Professional Psychology” article and select a topic of psychological research discussed in the article (e.g., evidence-based treatments, veterans/active military, multicultural issues, ethical issues, natural disasters, forensic, health, child psychology, suicide, chronic pain, rural practice, interpersonal violence, graduate/internship training and education, managed care issues, or professional roles). This topic will be used as the focus of the literature review you will be creating as part of your Final Project, as well as for aspects of other assignments within this course, so select a topic that is of personal interest to you.

In your post, discuss some of the methodological issues unique to this psychological research.

• State the topic you selected and then write two potential research questions that could be explored on the topic you selected. • Identify at least to answer each of the research questions you wrote (you will identify a total of two designs). • Each question will require a different research design to be selected to investigate the topic.


I chose the topic of Child Psychology: The impact of divorce on young children. 1. What are the possible effects or consequences of divorce for children? I will use quasi-experimental design. s

2. What are some effective interventions, to help young children deal with divorce? I will use a True experiment

Preparing for a Company Wide Migration to Windows 8

Assignment 1: Preparing for a Company-Wide Migration to Windows 8

Many organizations running on Windows Vista, Windows 7, or Windows XP are keen on upgrading them to Windows 8. Crescent Manufacturing Inc. (CMI) runs on Windows 7 and is keen on upgrading all its systems to Windows 8, which became available in the market from 2012. Windows 8 is now one of the most commonly utilized personal computer (PC) operating systems (OS). Microsoft developed it as one of the OS in its Windows NT OS family. Windows 7, which became available in the market in 2009, preceded Windows 8 (Paul, 2012). This paper explores the dynamics that may characterize CMI’s efforts geared towards the upgrade.

SWOT Analysis

A SWOT appraisal of CMI’s upgrade to Windows 8 is essential in determining its viability. There are various strengths that CMI can leverage on to ensure that the upgrade is successful and carried out effectively. First, the company has accumulated experience in the upgrading of computer systems to run on Windows 8. It recently upgraded the systems to make them able to run on the new OS. Second, all its servers are now capable of supporting computer systems running on the new OS.
Each of the servers in now running Windows Server 2012 in an environment based on Active Directory. Third, the company has a dedicated Information Technology (IT) department charged with the running of the systems and upgrading them as need arises. Notably, the department is populated with highly experienced IT professionals, with vast experiences in running Microsoft OS. The majority of CMI’s IT staffs were recently trained on the new OS. They are now adept at supporting, as well as operating, Windows 2008 along with Windows 2012.
There are diverse weaknesses defining the upgrade. First, the non-IT staffs in the company have limited knowledge on running not only Windows 8 but also running its predecessor. The non-IT staffs are unlikely to become proficient in using the new OS quickly since it is difficult, as well as confusing, to learn. Second, the company lacks some of the elementary Windows 8 requirements. Notably, to run the OS, an organization requires system requirements that are more advanced than those needed in relation to Windows 7.
To run Windows 8 throughout its branches and departments, an organization must have all its CPUs supporting PAE (Physical Address Extension), SSE2 as well as NX bit. To run Windows 8 throughout its branches and departments, an organization must have all its monitors are capable of running on a resolution of at least 1024 by 768. An organization can only run the new OS’ snap functionality throughout its branches and departments if all its monitors have a resolution of at least 1366 by 768.
There are various opportunities that CMI can exploit to ensure that the upgrade is done successfully. First, there are many trainings that it can afford all its staff members to make them adept at using computer systems running on Windows 8. Second, there are many training programs available to IT specialists to enhance their skills in upgrading OS, including all the available Microsoft OS.
There are diverse threats defining the upgrade. First, CMI may have difficulties in accessing Windows 8 to use on its computer systems since the OS is no longer distributed by retailers. The distribution of the Windows 8.1 is not favored by retailers at the expense of distributing Windows 8. Second, Windows 8 is unavailable in full-version online and the retail level for downloading. That means that all the computer systems that CMI would require to upgrade to Windows 8 must first be running on other Windows OS.

Download full paper on Preparing for a Company Wide Migration to Windows 8 Or Order original paper at an affordable price.

Impacts of Immigration in America

Organizational Impact on Immigration

  • Legal and illegal immigration into the United States has been increasing over the years.
  • The united States immigration system has not been quite restrictive since the year 1891
  • Evidence can clearly be seen from how easily the terrorists committed the attacks on 9/11
  • Interior security and enforcement could however be the change needed to curb the issue of immigration in America

Immigration impacts on human resource and budget

  • The foreign born population in America has been on the rise in recent past. The foreign-born workers have been estimated to account for 11.5 percent of the entire workforce.
  • It is estimated that the American tax payers have had to part with a cost of two hundred and thirty dollars every single year to cater for the immigrants.

Policy and politics impacts on immigration

  • One of the policies that should be put in place is the restrict border laws
  • Policies that will also ultimately affect the federal budget should also be put in place.
  • The state should also come up with an immigration modernization act to control the population of the immigrants in the most civil way


  • Government Accountability Office. Immigration Benefit Fraud, Focused Approach is Needed to Address Problems. GAO Report GAO-02-66. Washington, D.C.: GAO, 2002,
  • Nancy T. Kinney (2005). The Impact of Restrictive Immigration Policies on Political empowerment. Print
  • Vernon M. Briggs (1999). Immigration Policy and Human Resource Development. Cornell University

Download full powerpoint presentation on ways that organizational, human, and budget resources impact immigration in America or order original power point presentation at an affordable price.