Forum 5

Please take the Multiple Intelligences Test which can be found in a google search.

Once you have the results of the test, you can address the following discussion board prompts with your own personal results in mind.

Do you think multiple intelligences is a valid construct? In other words, do multiple intelligences exist?  (Be sure to include connections to the textbook/research when building your argument.)

Do you think that the test you took in Module 5 gave an accurate picture of your intellectual abilities?  In other words, do you think that test accurately measured what it is supposed to measure?

Provide at least one recommendation about how the developers of this multiple intelligences test could demonstrate evidence for the validity of the test.  Your recommendation should focus on one of the types of validity described in the textbook [i.e., content-related validity, predictive validity, concurrent validity, or construct validity (using convergent or discriminant evidence)].

Finally, make a Biblical argument either for or against the existence of multiple intelligences.  Whichever stance you take, be sure to back it up with meaningful and relevant scripture references.

MAKE SURE CONTENT IS 350 WORDS

Cyberbullying

Once each learner has chosen their topic, they need to identify at least 2 recent (no earlier than 2005) articles that address the topic. Each learner is encouraged to identify both a research/scientific (academic) and a practitioner oriented article. The research/scientific (academic) article will assist in providing a comprehensive definition of the topic and a description of key aspects of the topic, whereas the practitioner oriented article will provide more how to information.

1.    (Section 1) Define and briefly describe the topic using the information provided in the articles and other sources if necessary (try to secure a comprehensive definition of the topic and identify any classifications, typologies and dimensions e.g. branded video is defined as and has the following types and the first type is made up of the following dimensions , second type is made up of etc.).
2.    (Section 2) Identify the key points that the articles are making about the topic and present the information in a series of bulleted statements (suggest that you highlight the key points that the articles are making about using branded video as a marketing tactic). If necessary, expand briefly on each point to assist the reader in understanding the point being made.
3.    (Section 3) Briefly describe why the topic is important for organizations (what impact will the topic have on society, organizations, environment etc. (e.g. why are branded videos important for organizations). If no direct information is provided then you need to make thoughtful inferences.
4.    (Section 4) Briefly recommend key actions that should be taken with regard to this topic (e.g. how might this practice/activity be executed e.g. how should branded video be developed and deployed? Provide some information about the key general steps required execute this activity, and any other things that support efficient and effective execution (there should be information about recommended steps within the practitioner oriented literature). If no direct information is available then you need to make thoughtful inferences. Section 4 is only applicable if you chose a topic that is an activity or practice.
5.    Paper must be structured using the 4 sections indicated above (unless section 4 is not required) and must reference all sources on a separate page at the end (use the APA referencing format – http://www.apastyle.org ). The paper should be 3 pages in length (excluding the cover page and reference page), 11/2 line spacing, 12 point arial or verdana font, normal margins (typically 1 inch all around), cover page with topic title, course name, instructor name and student name and number. The paper must be saved in PDF format

Hacktivism And Cyberterrorism

 

As computer and internet technologies have advanced and become more easily accessible across the world, we are seeing an explosion of social activists, government agencies and terrorists using these technologies to further their efforts. Government and non-government entities use the internet to spread propaganda and information, recruit support and demonize opponents. The efforts of some radical groups, like ISIS, to shut down US infrastructure and thwart military activity can clearly be labeled as cyberterrorism. However, some groups, such as the loosely associated international network of self-proclaimed hacktivists identified as Anonymous, are blurring the lines between what constitutes terrorism and what is simply social activism. As technology continues to advance and further our capabilities, we are continuously presented with new and intriguing moral questions.

After reading the module notes and all of the supplemental materials, respond to the following:

  • Briefly define cyberterrorism. Define hacktivism. Illustrate examples of each in current events within the last decade.
  • What is the fundamental difference between these two?
  • How has technology helped to advance these groups?
  • How do you think our governments response to such groups has changed our attitudes towards our own freedoms?
  • In your opinion, do you think Hacktivism is justified or is it just a subset of cyberterrorism? Give some examples to support your stance.

Support your position using appropriate sources that are properly cited. 

Short Paper Deterrence And Mutually Assured Destruction

 

Effective arms control agreements are not generated by one nations willingness to make one-sided sacrifices; they are the product of the realization that all parties would gain from them. Nations enter into arms agreements because they have good reason to fear the consequences of unshackled military power.

For many years the Soviet Union and the U.S. engaged in an ever-escalating arms race involving the constant development of more innovative and powerful nuclear weapons. The Nonproliferation Treaty helped to slow down this escalation and put in place an agreement that helped to deter those nations without nuclear weapons from developing them. Military historians, career servicemen, and laymen have pondered why, with all of this capability, neither of these powers has initiated an attack (first-strike). Is this the result of the policy of mutually assured distraction (MAD)?

After reading the module notes and all supplemental materials, respond to following:

  • Illustrate the concept of mutually assured destruction (MAD) and describe its role as a deterrent in the prevention of first-strike attacks.
  • Discuss the morality of the MAD concept.
  • Given the current state of world military affairs, discuss whether this policy can continue to be the cornerstone of our military policy.
  • Are there any alternatives other than the forging of effective arms control treaties?

Support your position using appropriate sources that are properly cited. Your paper should be 2 pages in length (not including title and reference pages). It must be formatted according to  [PDF, File Size 131 KB], 6th edition, including title and reference pages.