Why does Socrates say that “a man who really fights for justice must lead a private, not a public, life if he is to survive for even a short time?” (p. 36 / 32a) Do you agree? Why or why not?

After reading Plato: Apology, all (p. 21-44)

Choose one of these questions to initiate your thinking. Use evidence from the text to support your idea. (1 to 2 thoughtful paragraphs is good enough)

  • Why does Socrates choose to defend himself in the style that he does? What is he hoping to accomplish with this defense? Does he really think that he will be found innocent of the charges? Does he care?
  • Why does Socrates say that “a man who really fights for justice must lead a private, not a public, life if he is to survive for even a short time?” (p. 36 / 32a) Do you agree? Why or why not?
  • What does it mean when Socrates says that “a good man cannot be harmed either in life or death”?

See attached file for more details.

Review the information in the text on cloud computing. Search for and review one major cloud computing vendor (Amazon, Microsoft Azure, VMware, IBM Cloud, Adobe, etc.). Briefly summarize (don’t copy and paste from the web site) its strengths and weaknesses.

Report Issue

 

Subject: Information Governance! – ITS-833

Week Chapters: Attaching Textbook Below Please Fallow That

Chapter 14 – Information Governance for Mobile Devices

Chapter 15 – Information Governance for Cloud Computing

Discussion: 1

Word Count Min: 300

Page: 276

(1) Review the specifications for the smart phone you use most frequently. What brand and model is it?

(2) Briefly summarize (don’t copy and paste from the phone’s vendor site) the data protection features it provides.

(3) Using the IG guidelines specified on p.276 in the text as background, provide a brief argument either for or against the data security for this device.

(4) In your opinion, based on IG guidelines, what data security improvements can be made?

Be original, creative, and constructive. Cite and reference as appropriate.

(this week’s discussions are more weighted than previous ones. Be sure to answer the question completely.)

Reference: 2 min

Discussion: 2

Word Count Min: 300

Chapetr: 15 Information Governance for Cloud Computing

(1) Review the information in the text on cloud computing. Search for and review one major cloud computing vendor (Amazon, Microsoft Azure, VMware, IBM Cloud, Adobe, etc.). Briefly summarize (don’t copy and paste from the web site) its strengths and weaknesses.

(2) Based on the IG principles outlined in Chapter 15 of the text, provide an argument targeted toward a middle-management business user on the pros and cons of using this vendor to fulfill a business need. Be specific in your response.

Be original, creative, and constructive. Cite and reference as appropriate.

(this week’s discussions are more weighted than previous ones. Be sure to answer the question completely.)

Reference: 2 min

Explain the recommendation and solutions to policy problems introduced from the readings in this class.

Report Issue

 

Research Paper Details

1. Write a research paper that explains the innovation and technologies policy issues and its impacts on people in a global environment.

2. Explain how Information Technology (IT) promotes people who are affected by policies involved in the policy-making process.

3. Include some of the theories that have been introduced in this class and how they are applicable in the context of global IT.

4. Explain the recommendation and solutions to policy problems introduced from the readings in this class.

5. Cite specific examples in your research and compare/contrast the specific policies

6. Deliverable Guidelines:

a. Follow APA format on the overall paper and listing peer-reviewed articles used to support your research. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

b. This assignment must be YOUR WORK! This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper.

c. You must reference at least two (2) peer-reviewed articles or papers that support your thesis statement. Cited sources must directly support your paper (i.e., not incidental references). One of these papers may be from your annotated bibliography assignment.

d. To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper.

e Please review the attached rubric for details on how the paper will be graded.

Propose the main investigative techniques that you would use to investigate the murder in this case. Provide a rationale for your response.

Read the case below and complete this assignment.

A child was playing in a local park with his brother. A car pulled up as they were leaving the playground. A man inside the car motioned for the two (2) boys to come over. The man asked the two (2) boys where the nearest convenience store was located. He then stated that he was not familiar with the area and asked the boys to show him the way and he would take them home afterwards. He also stated that he would buy them whatever they wanted if they agreed to show him. The youngest brother got into the car with the man and they drove away. The older sibling ran home and told his mother what had happened. The younger brother was not heard from that night and a report was made to the police. The next day a body was found in a dumpster behind a local garage. It was the younger brother, who had been strangled to death and was nude.

Imagine that you are the lead investigator in this case and develop a three (3) page investigation plan in which you:

  1. Outline the main steps that you would take immediately as it relates to the investigation of this case. Support your response.
  2. Propose your methods for evidence collection. Next, predict the main evidence that you would expect to find regarding the investigation of the death of the boy and the arrest of the suspect. Support your response.
  3. Propose the main investigative techniques that you would use to investigate the murder in this case. Provide a rationale for your response.
  4. Use at least two (2) quality academic resources as references, such as journal articles, newspapers, magazines, and publications from law enforcement associations. Note: Wikipedia, blogs, and similar websites do not qualify as quality academic resources.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.