Honor and Emotional Reactions

Honor and Emotional Reactions
Click here to read the APA ethical principles of psychologists and code of conduct.
Using the Online Library, search the article, “A Bumpy Train Ride: A Field Experiment on Insult, Honor, and Emotional Reactions.”
Pay special attention to the Method section. Summarize the purpose of the study. Think about the specific issues or points they should have covered in the debriefing session. Consider the APA ethical requirements. Write the specific things the investigators would have had to include during the debriefing session if the study had been conducted in the United States. Explain why the investigators would have to include these specific things. Compile your work in a 1- to 2-page Microsoft Word document.
Submission Details:
Support your responses with examples.
Cite any sources in APA format.
Name your document SU_PSY2061_W9_A1_LastName_FirstInitial
Submit your document to the Submissions Area by the due date assigned.

week 5

 By default, Docker containers are very secure. However, there are a number of ways you can add additional layers of security to harden your containers. For this week’s assignment, use the web and include at least four (4) different best practice techniques or additional security controls that can be used to secure containers. Include the action or control to be performed, why it’s important, how it works, what it will help to prevent, and how organizations will benefit from it.  You may include the commands or steps required to enable the control. Your assignment should be 3 pages in length, with two or more references in APA Format cited in your response. 

Physical Security

 

Topic: My father use to tell me that “locks keep honest people honest”. What do you think he meant by that? Is there any such thing as total security? Once you make your original post comment on a classmates post.

Instructions: Note that the requirement is to post your initial response no later than Friday and you must post one additional post during the week (end of Sunday). I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

Describe the technologies, hardware, and software used within the information technology field using visio to create a diagram that identifies the networking equipment needed to enable the workflow between these employees.

 

Directions

The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

The manager has provided the following employee descriptions:

  • Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.
  • Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.
  • Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

  • Describe all hardware components, including peripherals, needed to create the systems
  • Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:
    • Operating systems
    • Applications such as:
      • Office automation products
      • Security products
  • Describe security measures needed to support this system. Security measures could focus on:
    • Access
    • Administration and user passwords
    • Firewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.

Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.

ITISP W 3 D

 Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not? 

social engineering

Conduct your own social engineering experiments.

1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.

Write your findings in either a list or in paragraph form.

Discussion

Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.

Subject: Business Continuity Plan & Disaster Recovery Plan