Discussion board 3 | ETHC 101 – Introduction to Ethics | Liberty University

Text Book Readings:  

  • Jones: ch. 9
  • Stivers et al.: Part 5
  • https://learn.liberty.edu/webapps/bbgs-vitalsource-BBLEARN/app/launch/content?course_id=_451829_1&content_id=_26619643_1
  • https://learn.liberty.edu/webapps/bbgs-vitalsource-BBLEARN/app/launch/content?course_id=_451829_1&content_id=_26619644_1
  • Presentation: A Christian Ethic Approach to Ethics: https://download.liberty.edu/courses/02yta.mp4

  

Topic: My Ethical Theory

Thread: In this course you have spent a considerable amount of time studying metaethics, examining various ethical theories that promise to provide you with a methodology for determining right from wrong. These included a simple “list” metaethic, Virtue Ethics, Natural Law Ethics, Ethical Egoism, Utilitarianism, Duty Ethics, and the Revelational Christian Ethic, as well as related metaphysical views such as Social Contract Theory, Moral Realism, Divine Command Theory, and Divine Nature Theory. Now it is time for you to decide for yourself how you are going to distinguish what is moral from what is immoral. This is your chance to devise your own metaethical theory and present it to the class.

In a post of 500 to 600 words, systematically describe what you think is the best way to approach ethics. Your goal is to explain how we can know what makes an action moral or immoral. In doing this you must interact with the ethical theories that you have studied in class. You are not required to adopt one of these theories; you may make up your own or use one that you have come across in your research from other assignments/readings, but you can adopt one of the theories that you have studied if one of them seems best to you. Alternatively you can combine theories if you think certain aspects of various theories work and complement each other, but be careful that you do not adopt theories that contradict one another. 

In your thread, explain your theory and give a rationale for why you think yours is the best approach. Your argument(s) for your approach must be carefully-considered, logical arguments, not just “I feel like that would be best” or “that’s what I was raised to believe.”

Do not stray into a lengthy discussion of applied ethics. Be sure that this assignment focuses strictly on metaethics. Save applied ethics for your next Discussion Board. 

Be sure to carefully define your terms. You are encouraged to support your position with rational arguments, fitting examples, and expert sources. Any quotes or information used from sources other than yourself must be cited using footnotes in current Turabian format and will not count towards the total word count.

You will be penalized for falling short or exceeding the word count. This is a university-level writing assignment and therefore it must be carefully proofread, free of grammar, spelling, and punctuation errors. Do not use slang, emoticons, or abbreviations (as if you are texting or sending an email to a friend)

Security Incident | Blackboard Masters

Security Incident – Student
Summary:
ABC Company is a manufacturing company that produces new technology that sells online directly to customers and retailers. The system they use is a core transactional Enterprise Resource Planning system called NEDS. NEDS is similar to many core systems that provide integrated applications on a common platform for financials, managing materials, sales distribution, and production planning (similar to Oracle or SAP). NEDS is located in the Netherlands, while ABC Company is located in Florence, Kentucky. On June 15, 2016, James Hurd (ABC’s Global Security Director) was notified that NEDS was burglarized during business hours involving individuals stealing equipment including blackberries, iPhones, laptops and hard drives. Local police were notified and the incident was reported on that date. A police report only included identification of specific hardware that was stolen and several bicycles.
The burglary notification that was mailed was sent to a branch office of ABC Company in Mexico. James Hurd was notified by the Mexico office via email which included an attached electronic version of the burglary notification and police report on June 20, 2016. James Hurd recognized that the incident actually occurred 5 days earlier.
The letter contained the following information about the incident:
· The incident occurred in the application area that provides custom application development and reporting for the ABC Company.
· The area that was impacted involved “potential data” used for sales analysis. Data from the ABC Company had been placed on laptops while some diagnostics were being carried out.
· Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions, quantities, Purchase Order numbers, and purchase price.
You are James Hurd and need to respond to this incident by taking action immediately.
You will need to complete the following:
I. Develop an Incident Response Policy for ABC Company that will be used as your reference for your evaluation of this potential data incident (this is an attachment that should be included in your paper and referenced in your presentation).
II. Upon developing ABC Company’s Incident Response Policy, evaluate the incident described above:
· Summarize the data incident and potential level of risk, include why?
· Upon identifying the types of data that could potentially be impacted and what laws/regulations could be in violation of non-compliance if this data was breached
· Develop your action plan to evaluate this data incident (include your rationale for why the steps were necessary)
· Describe how the Incident Response Policy supported your actions
· Identify any issues that made the evaluation more difficult
· Identify areas of future risk mitigation actions should a similar incident occur (look at the gaps or issues with this scenario)
· Close the incident (NOTE: The outcome of the incident did not surface any major risks or data breach to the company but it took the evaluation to get to this conclusion)
This presentation must be support by the research paper.
Please note the following criteria:
Research paper:
· Research Paper must be in APA Style
· Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)
· Must be at least 5 double-spaced pages
· The Policy will be an Attachment and not count toward the 5 Page requirement
· Graphs, illustrations and spreadsheets are allowed, but will not count toward the 5 Page requirement
Grading criteria will include the following as this represents 40% of your grade:
Presentation will be 100 points and based on the following:
Completeness of the Topic (Policy, Processes, Action, Conclusion)
Presentation Delivery
Alignment of policy
Paper will be 100 points:
· Meets Standard Criteria
· Completeness/content
· Incident Risk Policy as Attachment
· Logic of Processes and Actions (Thoroughness)
· Alignment of the Incident Risk Policy components in completing and supporting the evaluation

women s health care in prisons

Write a ten (10) page paper that as a minimum, your project should include:

  1. Identify the topical area (e.g., local police department, community jail, border patrol)
  2. Define a problem or challenge within your topical area that you understand in some depth or have an interest in (examples include high crime rate, poor morale, high levels of violence or recidivism, high number of civilian complaints of harassment, inadequate equipment). Outline the context of the problem or challenge, including the history and any policy decisions that have contributed to the situation.
  3. Describe how internal or external stakeholders have influenced the situation in a positive or negative way. How will you consider stakeholders in your solution to the problem? How will you motivate individuals to buy into your solution?
  4. Discuss how technologies or information systems have contributed to the problem and how you will propose technology be implemented into the solution.
  5. Discuss what data you have collected or researched to indicate there is a problem. Include at least two sources of data and how each is relevant to the problem.
  6. Develop an effective and efficient solution(s) and a course of action (i.e., plan) that addresses the problem or challenge.
  7. Explain what methods of assessment you will employ to measure the effectiveness of your solutions.
  8. Develop a 10-15 slide PowerPoint Presentation that summarizes the seven items above.
  9. Use at least 8 quality references. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Assess a policy or problem and develop solutions based on available resources, taking into account the political and global implications.
  • Use technology and information resources to research issues in criminal justice.
  • Write clearly and concisely about criminal justice using proper writing mechanics.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post women s health care in prisons appeared first on Essay Writers.

Need ASAP! Tomorrow

What leadership qualities did Whitmore highlight and state that were likely to be common to all leaders? Do you agree or disagree with Whitmore’s assessment? Why or why not? Add at least one additional value that you feel is important and explain your rationale.
Plagiarism Free
Apa format
250 wordsThe post Need ASAP! Tomorrow first appeared on Blackboard Masters.