Intentionally deceiving in ”All The King’s men”

Many works of literature contain a character who intentionally deceives others. The characters dishonesty may
be intended either to help or to hurt. Such a character, for example, may choose to mislead others for personal safety,
to spare someones feelings, or to carry out a crime. Choose a novel or play in which a character deceives others.
Then, in a well-written essay, analyze the motives for that characters deception and discuss how the deception
contributes to the meaning of the work as a whole.

The character I’m using is Huey Long in “All the King’s men”

Preparedness, Response, and Recovery

Preparedness, Response, and Recovery

Over the last couple years it seems the number and severity of natural disasters has markedly increased. Since the low point of the response to Hurricane Katrina and the subsequent legislation to fix the federal response to disasters, is the Department of Homeland Security doing better in its coordinated responses? Is the current National Response Framework working? How do we balance the response and the need for controlling budget costs? In this assignment select one national level response to a hurricane, wild fire, or other natural hazard to evaluate the preparedness, response, and recovery efforts to the event. Your response should be written from a local, state, or federal perspective. Or you may examine the response from the perspective of a not-for-profit such as the International Red Cross of the Salvation Army.

To begin your research for this assignment, go to the Ashford University Library and conduct a search with the keywords Federal Response to Disasters. It is recommended that you do not use quotation marks for this search.
In your paper,
    Summarize the natural disaster.
    Evaluate the response from a local, state, or federal perspective.
    Identify the core issues that delayed or hindered the response.
    Identify what went right with the disaster response.
    Analyze the current Department of Homeland Security processes and procedures to determine their effectiveness for similar future disasters.
The Preparation, Response, and Recovery paper
    Must be two to three double-spaced pages in length (not including title and references pages) and formatted according to.
    Must use at least two scholarly sources in addition to the course text.
o    The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types.
    Must document all sources in APA style
   

REQUIRED RESOURCES
Text
Brians, C.L, Willnat, L., Manheim, J.B., & Rich, R.C. (2011). Empirical political analysis (8th ed.). Retrieved from https://redshelf.com

The full-text version of this e-book is available through your online classroom.
Articles
Brands, H., & Feaver, P. (2017). Trump and terrorism: U.S. strategy after ISIS. Foreign Affairs, 96(2), 28-36. Retrieved from https://www.foreignaffairs.com/

Kelly, J. F., Schumer, C., McCaskill, C., Slaughter, L., Biggs, A., Carter, J., Stodder, S. M M., & Camarota, S. A. (2017). The pros and cons of a Mexico border wall: Should congress fund the construction of a wall along the U.S. southern border? Congressional Digest, 96(8), 8-29. Retrieved from http://congressionaldigest.com/#gsc.tab=0

Klassen, J. (2013). Immigration and U.S. policy. In Research Starters: Sociology (Online Edition). Retrieved from https://www.ebscohost.com/discovery/content/research-starters

President Trump’s executive order on immigration. (2017). Congressional Digest, 96(3), 4-7. Retrieved from http://congressionaldigest.com/#gsc.tab=0

Multimedia
Mullins, B. (2016, January 20). Defeating the hackers – BBC documentary (Links to an external site.) [Video file]. Retrieved from https://youtu.be/HQJMg6FdcvQ

Wollman, L. (2013, January 3). Hypothesis 101 (and other Social Science concepts) (Links to an external site.). Center for Homeland Defense and Security Course: Research Methods, Naval Post Graduate School. Retrieved from https://www.chds.us/m/media/player?id=2928

Web Pages
Legal Information Institute. (n.d.). U.S. Constitution: Fifth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/fifth_amendment

Legal Information Institute. (n.d.). U.S. Constitution: First Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/first_amendment

Legal Information Institute. (n.d.). U.S. Constitution: 14th Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/amendmentxiv

Legal Information Institute. (n.d.). U.S. Constitution: Fourth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/fourth_amendment

Legal Information Institute. (n.d.). U.S. Constitution: Sixth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/sixth_amendment

Research Reports
Bjelopera, J. P. (2017). Domestic terrorism: An overview (Links to an external site.) [Research report]. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44921.pdf

Bjelopera, J. P. (2016). The Islamic States acolytes and the challenges they pose to U.S. law enforcement (Links to an external site.) [Research report]. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44521.pdf

U.S. Department of Homeland Security. (2010). Bottom-Up review report (Links to an external site.). Retrieved from https://www.dhs.gov/sites/default/files/publications/bur_bottom_up_review.pdf

RECOMMENDED RESOURCES
Articles
Deflem, M., & McDonough, S. (2015). The fear of counterterrorism: Surveillance and civil liberties since 9/11. Society, 52(1), 70-79. doi:10.1007/s12115-014-9855-1

Lewis, C. W. (2005). The clash between security and liberty in the U.S. response to terror. Public Administration Review, 65(1), 18-30. doi:10.1111/j.1540-6210.2005.00427.x

Mondale, W. F., Stein, R. A., & Fisher, C. (2016). No longer a neutral magistrate: The Foreign Intelligence Surveillance Court in the wake of the war on terror. Minnesota Law Review, 100(6), 2251-2312. Retrieved from http://www.minnesotalawreview.org/

Pea, A. (2007). Protecting Muslim civil and human rights in America: The role of Islamic, national, and international organizations. Journal of Muslim Minority Affairs, 27(3), 387-400. doi:10.1080/13602000701737236

Reinhardt, S. (2008). Weakening the Bill of Rights: A victory for terrorism. Michigan Law Review, 106(6), 963-973. Retrieved from http://michiganlawreview.org

Sutherland, D. W. (2005). Homeland security and civil liberties: Preserving America’s way of life (Links to an external site.). Notre Dame Journal of Law, Ethics & Public Policy, 19(1), 289-308. Retrieved from http://scholarship.law.nd.edu

West, D. M. (2012). A vision for Homeland Security in the Year 2025 (Links to an external site.).  Retrieved from http://www.insidepolitics.org/brookingsreports/homeland_security.pdf

Multimedia
Jennings, T. (Producer, Director & Writer). (2015). American terrorist. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=114683

Smith, M. (Producer & Writer), & Hirsch, L. (Producer). (2014). The rise of ISIS. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=60691

Smith, S. (Producer and Director). (2017). The new Al Qaeda. British Broadcasting Corp. Retrieved from https://youtu.be/-f7yxaw78dU

Thompson, G., & Corcoran, M. (Producers). (2017). Escape from Marawi. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=145249

TEDx Talks. (2015, June 29). Cyberwar | Amy Zegart | TEDxStanford (Links to an external site.) [Video file]. Retrieved from https://youtu.be/JSWPoeBLFyQ

TEDx Talks. (2012, April 22). Predicting the 9 biggest weather disasters in the next 30 years | Jeff Masters | TEDxBermuda (Links to an external site.) [Video file]. Retrieved from https://youtu.be/ZlojvcmgfQA

Web Pages
Border Security (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/border-security

Civil Rights and Civil Liberties (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/civil-rights-and-civil-liberties

Cybersecurity (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/cybersecurity

Disasters (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/disasters

Immigration Enforcement (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/immigration-enforcement 

Law Enforcement Partnerships (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/law-enforcement-partnerships

Preventing Terrorism (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/preventing-terrorism

Transportation Security (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/transportation-security

U.S. Department of Homeland Security. (2015, October 27). Written testimony of S&T under Secretary Dr. Reginald Brothers for a House Committee on Science, Space, and Technology hearing titled A Review of Progress by the Department of Homeland Security, Science and Technology Directorate. (Links to an external site.) Retrieved from https://www.dhs.gov/news/2015/10/27/written-testimony-st-under-secretary-house-committee-science-space-and-technology

Research Report
Tehan, R. (2017). Cybersecurity: Critical infrastructure authoritative reports and resources (Links to an external site.). Retrieved from https://fas.org/sgp/crs/misc/R44410.pdf

Introducing Indigenous Australia Reflective Essay

In weekly tutorials you are expected to contribute to group discussion, and write in your journals about each weekly topic. Using your journal as a resource, you will write a 1500 word reflective essay drawing from your journal that focuses on your learning and findings of one of the topics (lectures, tutorial discussion/online forum) presented to date. The assessment is designed to assist you to see how your learning has been developed over time.
You should focus on ONE key area of your learning for discussion that relates to the unit, ie if you felt you learnt about Indigenous identity, you may detail what your earlier thoughts or knowledge was, and demonstrate how that has changed, or developed over time.
A comprehensive essay will include:

Scholarly discussion of topic
First thoughts or knowledge on topic
Reflection on how the learning or knowledge has changed or developed over time
How this has or hasnt changed your world view
Indigenous perspective of topic

The 1500 word paper is to be written in an essay style with a minimum of 5 scholarly references, as well as reflections from your journal. It is acceptable to write in first or third person, or a combination.
Papers must be written in 12pt font (Times New Roman, Ariel, Calibri) with double spacing. You must adhere to either Harvard or APA referencing style. Referencing guides are available through the library http://www.mq.edu.au/on_campus/library/research/referencing/ 
You will submit your paper through turnitin on the units ilearn page. Late submissions will receive a penalty of 1 mark per day late.

Research Analysis for Uber Technologies

• Include a cover page with your name, your company, the term, and course name.
• Begin your paper on a new page with an Executive Summary that is no more than 1 page long. Brief
instructions for writing an Executive Summary.
• Begin the body of the paper on a new page. You must use the following main sections for your final paper,
with a heading (in Ariel Bold 14 point font) for each of these sections:
o Situation Analysis
This section explores the context and background of the problem-solving situation for your chosen company,
and it should start on a new page after the Executive Summary. This is the only section that starts on a new
page! This is where you attempt to understand the organization’s goals, mission/vision, and key stakeholders,
and it will guide the rest of your problem-solving activity. This is where you should include financial background
information, a competitive overview, and SWOT analysis. Create relevant charts and graphs that will give the
reader a concise, yet complete, picture of what happening with the company at this point in time.
o Problem Analysis & Description
Use this section to explore the critical issues facing the organization and ultimately define and describe a
problem that will be your focus for the remainder of the paper. In other words, you will solve the problem
identified and described in this section in the following sections of the paper. Gather additional data to support
issues identified in the Situation Analysis, analyze that data, identify key symptoms, prioritize these symptoms,
and find connections and relationships between them, if any. Symptoms are the indicators of the ultimate
problem. They are the “gaps” talked about in the course video. Provide a clear, focused problem description by
the end of the section. Be specific. Include numbers, if you can. Back it up with data gathered during your
research. Use some root cause analysis to ensure that you aren’t mistaking symptoms for causes. Refer back
to the Situation Analysis section and note any new stakeholders and any conflicts with the corporation’s
mission and vision. As I finish reading this section, I should have a clear idea of the problem you are solving
throughout the rest of the paper. If there is no single cause for your problem, list the range of possible causes.e
o Solutions, Evaluation & Recommendation
Based on the problem described in the previous section, develop at least two possible solutions and
describe them in as much detail as possible given the constraints of the paper. This is the decision-making part
of the paper. Use a weighted-criteria decision matrix to evaluate the solutions and make an informed
recommendation. Use a Cost/Benefit Analysis as part of your decision-making, either comparing the net
benefits of the various options or to show the Net Benefit of your final recommendation. By the end of this
section, you should make a clear choice, and present a strong case for why you made that choice. Convince
the reader.
o Implementation & Success Metrics
To the extent possible, prepare a brief discussion of how your solution can be implemented.
Develop a set of measures that can be used to evaluate the effectiveness of your solution in delivering
proposed benefits. Discuss when, how often, and how the solution should be evaluated.
• Your analysis must make use of a 10-K, an industry profile, as well as a variety of other relevant sources that
help you take a strong position, including data from your SWOT analysis. Don’t just rehash your SWOT
Analysis in the Situation Analysis. Write a narrative that summarizes all of the relevant information needed for
the reader to understand how you got to your conclusions about the problem identification. Imagine the reader
knows nothing about this company. Tell them enough so that the remainder of the paper makes sense. This is
a research paper, where you must support your claims and conclusions with the sources uncovered during
your research.
• The narrative body of your paper (excluding cover page, executive summary, graphics like charts, tables, and
graphs, and reference list) must be between 10 and 15 pages of text using 12-point Times Roman, with 1 inch
margins (left, right, top and bottom), left-justified and double-spaced.
• Follow APA style for citation

Sample Solution

The post Research Analysis for Uber Technologies appeared first on homework handlers.