Essay on Indigenous Literature

you can find the documents below please write an essay on the poem I am home again and also on the uses of indigenous literature please follow every instruction.

 Word Count: 500 words Style and Format: The paper should be formatted according to MLA style guide (https://owl.purdue.edu/owl/research_and_citation/mla_style/mla_formatting_and_style_guide/m la_sample_paper.html ). Please type it in Times New Roman 12 font. Description Focusing on the poem “I am Home Again”, write an essay that highlights how Indigenous poetry play an important role in the construction of an aesthetic identity and culture for the Indigenous communities of Canada in the 21st century. Refer to the essay “The Uses of Indigenous Literature” to illustrate/ elaborate on the social function of Indigenous literature. Add a Works Cited page at the end of your essay and include both the poem and the essay in this list. Writing Hint In the introduction clearly identity the topos (of the poem). You should also have a clear thesis statement in the introduction that addresses the following question: Home does the poem “I’m Home Again” create an aesthetic identity for the Indigenous communities of Canada? This would be the working thesis which should be revised once the first draft has been prepared. The body paragraphs should highlight the specific devices (imagery/refrain/personification/symbolism/metaphor/analogy) addressed in the thesis. Ensure that your topic sentences are clear and specific and each paragraph is developed around the specific topic sentence. Dedicate one body paragraph to discuss how the poem can be read in light of the points discussed in the essay “The Uses of Indigenous Literature”. Your body paragraphs should use quotations from the poem. Try not to use quotations in the introduction or the conclusion. 

Digital Forensics

Chief Executive Officer & Disgruntled Employee

Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO’s) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages. 

In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action. 

 Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages.

Thank goodness, information gathered from a router early in the investigation showed that the CEO’s IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization. 

The discovered MAC address used to locate the antisocial computer workstation belongs to a one of the disgruntled active employees who is a member of software development department within the organization.

Persistent investigation reveals that the disgruntled employee’s computer workstation is involved in this unlawful and criminal operation. 

Question-1

Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation?

Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of information technology security (ITS) team.

Question-2                

Do you agree that the digital forensic investigator must seek assistance from the organization ITS team to fully exonerate the CEO?

Question-3

Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene?

If Yes, provide a comprehensive narrative to support your assertion.

Organization leader and decision making – Discussion

Note : Please answer below 3 questions and APA 7 format 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what ethical leadership is and how it impacts the organizational culture.
  2. What are the various dimensions of ethical leadership?
  3. Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.

Please be sure to answer all the questions above in the initial post.Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

Dissertation Topic Proposal

The attached document is my dissertation topic, please make the required changes to the document to met the following feedback.

Feedback:

 

This is an interesting topic, but I am not sure what you are trying to accomplish in this research. Are you saying biometric authentication has not been implemented to mitigate social engineering and you want to implement one?

You stated, “The purpose of implementing biometric authentication is that it can aid in reducing password vulnerability, secure log process in the system, and enhance conveniences like quick log in using fingerprint and reduce desk help cost which comes with a call for passwords.”

You also stated, “The research will also tent to protect the availability, confidentiality, and integrity of enterprise valuable assets. The implementation of biometric authentication will ensure confidentiality, authentication of data, data entity authentication, and availability. Biometric authentication should be oriented to the internet to analyze the security gap for any given generic application in the system.”

 Are you planning to create an implementation project with biometrics to measure increase protection? If so, how will you implement? How will you measure? Provide clarifying information for the department and resubmit 

Please review and clarify what the goal of this study is. 

Questions

Information Systems for Business and Beyond Questions:

  • Chapter 9 – study questions 1-10, Exercise 3 &4. 

Information Technology and Organizational Learning Assignment:

  • Chapter 7 – Review the section on dealing with multiple locations and outsourcing.  Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.

Homework

Culture is an ongoing negotiation of learned patterns of beliefs, attitudes, values, and behaviors.

List some of your personal, social, and cultural identities.  Are there any of these that are interrelated?  In what way? For your cultural identities, which ones are dominant and which ones are nondominant? How does a person navigate between two cultural identities? 

How does your personal, social, and cultural identities impact you as a communicator and as a listener?

5

 

Instructions 

Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.

Instructions

Now that you have watched the video – please complete this assignment. 

1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that a bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.

5s week 11 assignment PL

In 500 words

Video Link: https://time.com/5168202/russia-troll-internet-research-agency/

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include References, do not copy paste strictly.