disscussion2

In the Ancient Greek world (the world of Socrates, Plato, and Aristotle, often regarded as the birthplace of philosophy) a “symposium” was a banquet held after a meal, an “after party” of sorts that usually included drinking, dancing, recitals, and engaging conversations on the topics of the day.

For our purposes in this course, the Symposium discussions will not involve dancing, recitals, or a banquet, but they will provide food for thought on current ethical issues and direct application of the ethical theory discussed in each of these weeks.

It is almost impossible these days to turn on the news or log onto social media without encountering a controversy that cries out for ethical discussion. For these Symposium discussions, your instructor will choose a topic of current ethical interest and a resource associated with it for you to read or watch. Your task is to consider how the ethical theory of the week might be used to examine, understand, or evaluate the issue.

This week, you will consider how utilitarianism applies to a controversy, dilemma, event, or scenario selected by your instructor. It is a chance for you to discuss together the ethical issues and questions that it raises, your own response to those, and whether that aligns with or does not align with a utilitarian approach. The aim is not to simply assert your own view or to denigrate other views, but to identify, evaluate, and discuss the moral reasoning involved in addressing the chosen issue.

Your posts should remain focused on the ethical considerations, and at some point in your contribution you must specifically address the way a utilitarian would approach this issue by explaining and evaluating that approach.

If you have a position, you should strive to provide reasons in defense of that position.

When responding to peers, you should strive to first understand the reasons they are offering before challenging or critiquing those reasons. One good way of doing this is by summarizing their argument before offering a critique or evaluation.

You must post on at least two separate days, must include at least one substantial reply to a peer or to your instructor, and your posts should add up to at least 400 words.

Your instructor may include additional requirements, so be sure to pay attention to the prompt.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.


Buy Custom Nursing Papers

 

“Are you looking for this answer? We can Help click Order Now”


University of Phoenix Request for Proposal Summary

Create a 350 word summary based off information below. APA Format

Request for Proposal (RFP) Once an organization selects a project, the customer or project manager is frequently responsible for developing a request for proposal (RFP) for the project or sections of the project. The responsible project manager will require input data from all stakeholders connected to the activities covered in the RFP. The RFP will be announced to external contractors/vendors with adequate experience to implement the project. For example, government projects frequently advertise with a “request for proposal” to outside contractors for roads, buildings, airports, military hardware, space vehicles. Similarly, businesses use RFPs to solicit bids for building a clean room, developing a new manufacturing process, delivering software for insurance billing, conducting a market survey. In all of these examples, requirements and features must be in enough detail that contractors have a clear description of the final deliverable that will meet the customer’s needs. In most cases the RFP also specifies an expected format for the contractor’s bid proposal so the responses of different contractors can be fairly evaluated. Although we typically think of RFPs for external contractors, in some organizations RFPs are used internally; that is, the organization sends out an RFP to different divisions or departments. The content of the RFP is extremely important. In practice, the most common error is to offer an RFP that lacks sufficient detail. This lack of detail typically results in conflict issues, misunderstandings, often legal claims between the contractor and owner, and, in addition, an unsatisfied customer. All RFPs are different, but the outline in Figure A2.1 is a good starting point for the development of a detailed RFP. Each step is briefly described next. 1. Summary of needs and request for action. The background and a simple description of the final project deliverable are given first. For example, through simulated war games, the U.S. Navy has found their giant warships of the past are too vulnerable against today’s technology (an example is the Silkworm antiship missiles). In addition, the Navy’s mission has shifted to supporting ground forces and peacekeeping missions, which require getting closer to shore. As a result, the Navy is revamping ships for near-shore duty. The Navy will select three designs for further refinement from the responses to its RFP. In general, it is expected that the new ship will be capable of at least 55 knots, measure between 80 and 250 feet in length, and be fitted with radar absorbing panels to thwart guided missiles. FIGURE A2.1 Request for Proposal Page 642. Statement of work (SOW) detailing the scope and major deliverables. For example, if the project involves a market research survey, the major deliverables could be design, data collection, data analysis, and providing recommendations by February 21, 2014, for a cost not to exceed $300,000. 3. Deliverable specifications/requirements, features, and tasks. This step should be very comprehensive so bid proposals from contractors can be validated and later used for control. Typical specifications cover physical features such as size, quantity, materials, speed, and color. For example, an IT project might specify requirements for hardware, software, and training in great detail. Tasks required to complete deliverables can be included if they are known. 4. Responsibilities—vendor and customer. Failing to spell out the responsibilities for both parties is notorious for leading to serious problems when the contractor implements the project. For example, who pays for what? (If the contractor is to be on site, will the contractor be required to pay for office space?) What are the limits and exclusions for the contractor? (For example, who will supply test equipment?) What communication plan will be used by the contractor and owner? If escalation of an issue becomes necessary, what process will be used? How will progress be evaluated? Well-defined responsibilities will avoid many unforeseen problems later. 5. Project schedule. This step is concerned with getting a “hard” schedule which can be used for control and evaluating progress. Owners are usually very demanding in meeting the project schedule. In today’s business environment, time-to-market is a major “hot button” that influences market share, costs, and profits. The schedule should spell out what, who, and when. 6. Costs and payment schedule. The RFP needs to set out very clearly how, when, and the process for determining costs and conditions for progress payments. 7. Type of contract. Essentially there are two types of contracts—fixed-price and cost-plus. Fixed-price contracts agree on a price or lump sum in advance, and it remains as long as there are no changes to the scope provisions of the agreement. This type is preferred in projects that are well defined with predictable costs and minimal risks. The contractor must exercise care estimating cost because any underestimating of costs will cause the contractor’s profit to be reduced. In cost-plus contracts the contractor is reimbursed for all or some of the expenses incurred during performance of the contract. This fee is negotiated in advance and usually involves a percent of total costs. “Time and materials” plus a profit factor are typical of cost-plus contracts. Both types of contracts can include incentive clauses for superior performance in time and cost, or in some cases, penalties—for example, missing the opening date of a new sports stadium. 8. Experience and staffing. The ability of the contractor to implement the project may depend on specific skills; this necessary experience should be specified, along with assurance such staff will be available for this project. 9. Evaluation criteria. The criteria for evaluating and awarding the project contract should be specified. For example, selection criteria frequently include methodology, price, schedule, and experience; in some cases these criteria are weighted. Use of the outline in Figure A2.1 will help to ensure key items in the proposal are not omitted. A well-prepared RFP will provide contractors with sufficient guidelines to prepare a proposal that clearly meets the project and customer’s needs. Page 65SELECTION OF CONTRACTOR FROM BID PROPOSALS Interested contractors respond to project RFPs with a written bid proposal. It is likely that several contractors will submit bid proposals to the customer. The final step in the RFP process is to select the contractor who best meets the requirements requested in the RFP. The selection criteria given in the RFP are used to evaluate which contractor is awarded the contract to implement the project. Losing contractors should be given an explanation of the key factors that led to the selection of the winning contractor/vendor; appreciation for their participation and effort should be acknowledged. See Figure A2.2, Contractor Evaluation Template, adapted from one used in practice.

The post University of Phoenix Request for Proposal Summary appeared first on Brainy Term Papers.


University of Phoenix Request for Proposal Summary was first posted on February 25, 2021 at 2:10 pm.
©2019 "Brainy Term Papers". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@nursingessayswriters.com

 

“Are you looking for this answer? We can Help click Order Now”


Step 1: Conduct a Policy Gap AnalysisAs you begin

Step 1: Conduct a Policy Gap AnalysisAs you begin Step 1 of your system security report on cybersecurity for mergers and acquisitions, keep in mind that the networks of companies going through an M&A can be subject to cyberattack. As you work through this step and the others, keep these questions in mind:Are companies going through an M&A prone to more attacks or more focused attacks?If so, what is the appropriate course of action?Should the M&A activities be kept confidential?Now, look at the existing security policies in regard to the acquisition of the media streaming company. You have to explain to the executives that before any systems are integrated, their security policies will need to be reviewed.Conduct a policy gap analysis to ensure the target company’s security policies follow relevant industry standards as well as local, state, and national laws and regulations. In other words, you need to make sure the new company will not inherit any statutory or regulatory noncompliance from either of the two original companies. This step would also identify what, if any, laws and regulations the target company is subject to. If those are different from the laws and regulations the acquiring company is subject to, then this document should answer the following questions:How would you identify the differences?How would you learn about the relevant laws and regulations?How would you ensure compliance with those laws and regulations?The streaming company that is being acquired has a current customer base of 150,000 users, who on average pay $14.99 in monthly fees. Based on the overall income, use PCI Standards DSS 12 requirements, and the PCI DSS Quick Reference Guide to identify a secure strategy, and operating system protections to protect the credit card data.Select at least two appropriate requirements from the PCI Standards DSS 12 set of requirements and explain how the controls should be implemented, how they will change the current network, and any costs associated with implementing the change.In the next step, you will review the streaming protocols that the companies are using.Step 2: Review Protocols for Streaming ServicesAfter reviewing the policies from the company and the policy gap analysis, the M&A leader asks you about the protocols used by the streaming company. He wants to know if the protocols used would affect the current state of cybersecurity within the current company environment. For this section, review the protocols, explain how they work along with any known vulnerabilities, and how to secure the company from cyberattacks. Start with researching the commonly known streaming protocols and the vulnerabilities of those protocols. Some examples are the Real-Time Streaming Protocol (RTSP), Real-Time Transport Protocol (RTP) and the Real-Time Transport Control Protocol (RTCP).Additionally, the leadership wants to know if any vulnerabilities identified would or could lead to a no-go on the M&A.In other words:You need to identify what streaming the companies are doing and the specific technology they are leveraging.What are the technical vulnerabilities associated with the protocols involved?Have those been mitigated? And to what extent (i.e., has the risk been reduced to zero, reduced somewhat, shifted to a third party, etc.)?What residual risk to the target company’s assets and IP remain?Would those risks extend to the current (takeover) company after the merger?a. Would that be bad enough to cancel the M&A?If the response to #5 is yes, then, what should the target company do to further mitigate the risk? How should the takeover company mitigate the risk?What are the costs associated to the target company (implementing the appropriate mitigation)? If the takeover firm has to take additional measures, identify those costs as well.After assessing and reviewing the streaming protocols, move to the next step, where you will assess the infrastructure of the merged network.Step 3: Assess the Merged Network InfrastructureYouve just reviewed the streaming services of the companies, and now you will assess the infrastructure of the new network. The networks of the two companies could be configured differently, or they could use the same hardware and software, or completely different hardware and software.The purpose of this section is to understand what tools the company is using, the benefits and shortcomings of those tools, and the gaps within the network. Explain what tactics, techniques, and procedures you would use to understand the network. You should identify firewalls, DMZ(s), other network systems, and the status of those devices.When your assessment of the infrastructure is complete, move to the next step, where you will assess any existing policies for wireless and bring your own device (BYOD) within the companies.Step 4: Review the Wireless and BYOD PoliciesWithin Project 2, you learned about and discussed wireless networks. An M&A provides an opportunity for both companies to review their wireless networks. Within your report, explain the media company’s current stance on wireless devices and BYOD. However, the company that is being acquired does not have a BYOD policy. Explain to the managers of the acquisition what needs to be done for the new company to meet the goals of the BYOD policy.When the review of the wireless and BYOD policies is complete, move to the next step: developing a data protection plan.Step 5: Develop a Data Protection PlanYouve completed the review of the wireless and BYOD policies. In this step, you will develop the recommendations portion of your report in which you will suggest additional mechanisms for data protection at different levels of the acquired companys architecture.Include the benefits, implementation activities required for protection and defense measures such as full disk encryption, BitLocker, and platform identity keys. You also want to convey to your leadership the importance of system integrity and an overall trusted computing base, environment, and support. Describe what this would entail and include Trusted Platform Module (TPM) components and drivers. How are these mechanisms employed in an authentication and authorization system? Include this in the report and whether the merging company has this.In the next step, you will assess any risks with the supply chain of the acquired company.Step 6: Review Supply Chain RiskThe data protection plan is ready. In this step, you will take a look at risks to the supply chain. Acquiring a new company also means inheriting the risks associated with its supply chain and those firm’s systems and technologies. Include supply chain risks and list the security measures in place to mitigate those risks. Use the


 

. WITH BEST NURSING TUTORS TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

The post Step 1: Conduct a Policy Gap AnalysisAs you begin appeared first on BEST NURSING TUTORS .

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Step 1: Conduct a Policy Gap AnalysisAs you begin appeared first on The Nursing Hub.

 

“Are you looking for this answer? We can Help click Order Now”


rutherfold phd only

review the movie

“crying out for freedom”

Birng out Kent’s ethical theory of goodness for purposes

MLA

2PAGES

DUE IN 9HRS

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post rutherfold phd only appeared first on Essay Writers.

 

“Are you looking for this answer? We can Help click Order Now”