Part 1
Discussion Questions:
Externalities and the Environment
Meyer describes the “Tragedy of the Commons.” The IMF article explains how this type of problem is an example of an “externality.” What is an externality? What might be a good government policy to solve the problem of the environmental externality that leads to high greenhouse gas emissions?
Moral Hazard and Adverse Selection
“Moral hazard” is a term often used in the context of peoples’ behavior once they have insurance. Szuchman and Anderson explore the idea of moral hazard in personal relationships. How would you define moral hazard? Provide an example of a moral hazard that you have observed in your own community or workplace.
How does moral hazard differ from adverse selection? Provide an example to illustrate this concept.
Part 2 Dis of 5
Monetary Policy and Inflation
Discussion Questions:
The Fed and Monetary Policy
Monetary policy is the action taken by the Federal Reserve to expand or contract the money supply and influence interest rates.
What are the current unemployment and inflation rates? How has the Fed redefined its targets for inflation and unemployment, and how do current conditions compare to those targets?
As the top advisor to the chair of the Federal Reserve, define contractionary and expansionary monetary policies and explain which you advise the Fed to pursue today—given the inflation and unemployment targets versus the current rates.
Inflation – Winners and Losers
We often hear of inflation characterized as a bad thing, but Meyer describes both winners and losers from inflation. Give an example of one way in which you would win from unexpected inflation and an example of one way in which you would lose from unexpected inflation.
Before answering these questions, review this Summary of New Fed Monetary Policies. You may consult other sources as well and include them in your bibliography.
Part 3 of Discussion 7
Graded Discussion Week 7
Classical or Keynesian?
Classical v. Keynesian Approaches to Smoothing Business Cycles
Fiscal policies are the actions of Congress on spending and taxing. (Note this is different from monetary policy, which is the action taken by the Federal Reserve to change the money supply and interest rates.)
Explain and compare the Keynesian and classical points of view on whether or not to intervene during the business cycle (an expansion = positive real GDP growth; and a recession = negative real GDP growth).
Are we in recession today? Use today’s real GDP growth rates to explain your answer.
As the President’s chief economist, describe the Keynesian fiscal policy you think the administration should follow, given today’s economic conditions. Support your point of view using principles of Keynesian economics, as described by Mayer in Chapter 16 of Everything Economics.
The attached summary (How our Government Supports its Citizens) outlines a number of government functions that contribute to a well-functioning society and economy.
List and explain two ways that in your everyday life there is a need for an effective government role in the economy.
What are two examples of government functions that help correct a market failure?
How our Government Supports its Citizens .docx(this document is attach, go through it before answering)
Category: Computer Science homework help
Part 1 Discussion Questions: Externalities and the Environment Meyer descri
Part 1
Discussion Questions:
Externalities and the Environment
Meyer describes the “Tragedy of the Commons.” The IMF article explains how this type of problem is an example of an “externality.” What is an externality? What might be a good government policy to solve the problem of the environmental externality that leads to high greenhouse gas emissions?
Moral Hazard and Adverse Selection
“Moral hazard” is a term often used in the context of peoples’ behavior once they have insurance. Szuchman and Anderson explore the idea of moral hazard in personal relationships. How would you define moral hazard? Provide an example of a moral hazard that you have observed in your own community or workplace.
How does moral hazard differ from adverse selection? Provide an example to illustrate this concept.
Part 2 Dis of 5
Monetary Policy and Inflation
Discussion Questions:
The Fed and Monetary Policy
Monetary policy is the action taken by the Federal Reserve to expand or contract the money supply and influence interest rates.
What are the current unemployment and inflation rates? How has the Fed redefined its targets for inflation and unemployment, and how do current conditions compare to those targets?
As the top advisor to the chair of the Federal Reserve, define contractionary and expansionary monetary policies and explain which you advise the Fed to pursue today—given the inflation and unemployment targets versus the current rates.
Inflation – Winners and Losers
We often hear of inflation characterized as a bad thing, but Meyer describes both winners and losers from inflation. Give an example of one way in which you would win from unexpected inflation and an example of one way in which you would lose from unexpected inflation.
Before answering these questions, review this Summary of New Fed Monetary Policies. You may consult other sources as well and include them in your bibliography.
Part 3 of Discussion 7
Graded Discussion Week 7
Classical or Keynesian?
Classical v. Keynesian Approaches to Smoothing Business Cycles
Fiscal policies are the actions of Congress on spending and taxing. (Note this is different from monetary policy, which is the action taken by the Federal Reserve to change the money supply and interest rates.)
Explain and compare the Keynesian and classical points of view on whether or not to intervene during the business cycle (an expansion = positive real GDP growth; and a recession = negative real GDP growth).
Are we in recession today? Use today’s real GDP growth rates to explain your answer.
As the President’s chief economist, describe the Keynesian fiscal policy you think the administration should follow, given today’s economic conditions. Support your point of view using principles of Keynesian economics, as described by Mayer in Chapter 16 of Everything Economics.
The attached summary (How our Government Supports its Citizens) outlines a number of government functions that contribute to a well-functioning society and economy.
List and explain two ways that in your everyday life there is a need for an effective government role in the economy.
What are two examples of government functions that help correct a market failure?
How our Government Supports its Citizens .docx(this document is attach, go through it before answering)
Questions: How has the current cultural environment of our country shaped th
Questions:
How has the current cultural environment of our country shaped the way that companies are looking at their own corporate cultural standards?
What are the potential downfalls and positive influences of the “Netflix way”?
How does Netflix’s internal culture negatively or positively affect its ability to stay competitive and deliver cutting-edge content?
Today’s news is littered with scandals, new allegations of sexual assault, and tragedy. Since 2017 and the #metoo movement, stemming from the Harvey Weinstein scandal, more and more public figures have been put into the spotlight to defend themselves against allegations from women around the globe.
Not only publicly, but privately in companies around the world, there have been firings and investigations into misconduct from coworkers, managers, and CEOs. It is a relevant topic that is getting long-overdue publicity and encouraging more men and women to come forward to discuss openly rather than hide the events and injustices of the past. Other events showcase the tumultuous and on-edge society we are living in, such as the Charlottesville, VA, attack that left one dead and 19 injured when a person drove a car through a crowd of protestors during a white nationalist gathering.
With unanticipated events on a daily business, it is important for companies to take a stand against racial hatred and harassment of any kind, and to have firm policies when such events occur. Take Netflix, for example, who in July 2018 fired their chief communications officer for saying the “N-word” in full form. This event occurred during an internal meeting in which the speaker was not directing the slur at anyone specific but claimed it was being made as an emphatic point about offensive words in comedy programming. The “Netflix way,” the culture that is built around radical candor and transparency, was put to the test during this occurrence.
The offender, Jonathan Friedland, attempted to apologize for his misdeed, hoping it would fade away and his apology would be accepted. However, it didn’t work that way; instead, the anger was palpable between coworkers and eventually led to the firing of Friedland after a few months of inaction.
Netflixers are given a high level of freedom and responsibility within their “Netflix way” culture. Blunt feedback is encouraged, and trust and discretion are the ultimate gatekeeper, as employees have access to sensitive information and are ultimately trusted for how they expense items and take vacation time.
In the insanely fast-paced streaming-services industry, it is hard to keep this culture at a premium, but it is imperative for the success of the company overall. “As you scale a company to become bigger and bigger, how do you scale that kind of culture?” said Colin Estep, a former senior engineer who left voluntarily in 2016. “I don’t know that we ever had a good answer.”
In order to keep up, sometimes the company is seen as harsh in their tactics to keep the best of the best. “I think we’re transparent to a fault in our culture and that can come across as cutthroat,” said Walta Nemariam, an employee in talent acquisition at Netflix.
Netflix has stayed true to their cultural values despite the pressures and sometimes negative connotations associated with this “cutthroat” environment. Their ability to remain agile, while displaying no tolerance for societal injustices, puts them at the forefront of new-age companies. It is a difficult pace to stay in line with, but it seems that they are keeping in stride and remaining true to who they are, for now.
References
B. Stelter, “The Weinstein Effect: Harvey Weinstein scandal sparks movements in Hollywood and beyond,” CNN Business, October 20, 2017, https://money.cnn.com/2017/10/20/media/weinstein-effect-harvey-weinstein/; L. Hertzler, “Talking #MeToo, one year after bombshell Weinstein allegations,” Penn Today, October 30, 2018, https://penntoday.upenn.edu/news/talking-me-too-one-year-later; S. Ramachandaran and J. Flint, “At Netflix, Radical Transparency and Blunt Firings Unsettle the Ranks,” Wall Street Journal, October 25, 2018, https://www.wsj.com/articles/at-netflix-radical-transparency-and-blunt-firings-unsettle-the-ranks-1540497174.
Questions: How has the current cultural environment of our country shaped th
Questions:
How has the current cultural environment of our country shaped the way that companies are looking at their own corporate cultural standards?
What are the potential downfalls and positive influences of the “Netflix way”?
How does Netflix’s internal culture negatively or positively affect its ability to stay competitive and deliver cutting-edge content?
Today’s news is littered with scandals, new allegations of sexual assault, and tragedy. Since 2017 and the #metoo movement, stemming from the Harvey Weinstein scandal, more and more public figures have been put into the spotlight to defend themselves against allegations from women around the globe.
Not only publicly, but privately in companies around the world, there have been firings and investigations into misconduct from coworkers, managers, and CEOs. It is a relevant topic that is getting long-overdue publicity and encouraging more men and women to come forward to discuss openly rather than hide the events and injustices of the past. Other events showcase the tumultuous and on-edge society we are living in, such as the Charlottesville, VA, attack that left one dead and 19 injured when a person drove a car through a crowd of protestors during a white nationalist gathering.
With unanticipated events on a daily business, it is important for companies to take a stand against racial hatred and harassment of any kind, and to have firm policies when such events occur. Take Netflix, for example, who in July 2018 fired their chief communications officer for saying the “N-word” in full form. This event occurred during an internal meeting in which the speaker was not directing the slur at anyone specific but claimed it was being made as an emphatic point about offensive words in comedy programming. The “Netflix way,” the culture that is built around radical candor and transparency, was put to the test during this occurrence.
The offender, Jonathan Friedland, attempted to apologize for his misdeed, hoping it would fade away and his apology would be accepted. However, it didn’t work that way; instead, the anger was palpable between coworkers and eventually led to the firing of Friedland after a few months of inaction.
Netflixers are given a high level of freedom and responsibility within their “Netflix way” culture. Blunt feedback is encouraged, and trust and discretion are the ultimate gatekeeper, as employees have access to sensitive information and are ultimately trusted for how they expense items and take vacation time.
In the insanely fast-paced streaming-services industry, it is hard to keep this culture at a premium, but it is imperative for the success of the company overall. “As you scale a company to become bigger and bigger, how do you scale that kind of culture?” said Colin Estep, a former senior engineer who left voluntarily in 2016. “I don’t know that we ever had a good answer.”
In order to keep up, sometimes the company is seen as harsh in their tactics to keep the best of the best. “I think we’re transparent to a fault in our culture and that can come across as cutthroat,” said Walta Nemariam, an employee in talent acquisition at Netflix.
Netflix has stayed true to their cultural values despite the pressures and sometimes negative connotations associated with this “cutthroat” environment. Their ability to remain agile, while displaying no tolerance for societal injustices, puts them at the forefront of new-age companies. It is a difficult pace to stay in line with, but it seems that they are keeping in stride and remaining true to who they are, for now.
Sources: B. Stelter, “The Weinstein Effect: Harvey Weinstein scandal sparks movements in Hollywood and beyond,” CNN Business, October 20, 2017, https://money.cnn.com/2017/10/20/media/weinstein-effect-harvey-weinstein/; L. Hertzler, “Talking #MeToo, one year after bombshell Weinstein allegations,” Penn Today, October 30, 2018, https://penntoday.upenn.edu/news/talking-me-too-one-year-later; S. Ramachandaran and J. Flint, “At Netflix, Radical Transparency and Blunt Firings Unsettle the Ranks,” Wall Street Journal, October 25, 2018, https://www.wsj.com/articles/at-netflix-radical-transparency-and-blunt-firings-unsettle-the-ranks-1540497174.
Understanding the Work of the IT Governance Board Post your initial response
Understanding the Work of the IT Governance Board
Post your initial response of at least 150 words
The work of the company’s governance boards and committees is extremely important since these groups plan, design, negotiate, implement and provide oversight for the processes, policies, procedures, and other mechanisms used to guide, monitor, control, and assess the operations of the company. Each board is comprised of executives who each represent their functional areas or a group of internal stakeholders. Usually, there is a chair position that rotates among the members. If you would like to learn more about corporate governance in general, Deloitte’s report Developing an effective governance operating model: A guide for financial services boards and management teams provides a brief but comprehensive overview (see https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Financial-Services/dttl-fsi-US-FSI-Developinganeffectivegovernance-031913.pdf). You may also find this article What is a management system?, from the International Standards Organization, helpful as it explains what a management system is and why standards are needed to define repeatable steps that organizations can use to ensure the effectiveness and efficiency of their management activities.
The next meeting of the IT Governance board will include a set of orientation briefings for the new members. If you had to make a recommendation to the IT Governance board for standards that should be followed as it relates to cybersecurity in an organization, what would that standard be? For example, the following IT management / IT security management frameworks, standards, and models.
COBIT
ITIL
ISO 27001 (ISMS Program Management)
NIST Cybersecurity Framework
NIST Security and Privacy Controls (NIST SP 800-53)
NIST Risk Management Framework (NIST SP 800-37)
Cite your sources as appropriate.
Part 2
Research report 1
Instructions are in the attach document
Identify and briefly discuss two important concepts from “Business Continuity P
Identify and briefly discuss two important concepts from “Business Continuity Planning and Disaster Recovery” that are applicable in IT industry. A substantive post will do at least two of the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
Make an argument concerning the topic
Use proper citations and references in your post.
Identify and briefly discuss two important concepts from “Business Continuity P
Identify and briefly discuss two important concepts from “Business Continuity Planning and Disaster Recovery” that are applicable in IT industry. A substantive post will do at least two of the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
Make an argument concerning the topic
Use proper citations and references in your post.
Part 1 Before you begin working on this discussion post, please make sure tha
Part 1
Before you begin working on this discussion post, please make sure that you have read the Week 1 readings!
Welcome to Padgett-Beale and your first week as a management intern.
The Chief of Staff will be hosting a working lunch this week for your group of interns. In addition to the usual introductions and “getting to know you” discussions, you’ve been advised that there will be a discussion of the following article.
Seasonal Employee Security Risks: Present Danger, Proactive Defense
Each intern has been asked to write and bring a discussion paper containing their written responses to the following questions:
What steps can (should) managers take to reduce security risks associated with hiring seasonal or temporary employees? (Consider whether or not the Secure Computer User training course would be appropriate for these employees.)
How can managers show leadership in the area of cybersecurity defenses and best practices?
Consider the ways in which these types of companies are likely to use seasonal employees and the types of digital assets / information to which these temporary employees may have access.
Part 2
Responding to Guest Concerns about Cyberattacks
your internship assignment is with the company’s Guest Relations office.
You have been asked to draft a letter to guests to address concerns about the impacts of possible cyberattacks. Recently there have been news reports describing cyberattacks on the hospitality industry. This letter should reassure guests that the company is taking positive steps to protect guest privacy. Consider the technical and people perspectives.
There are legal requirements for such a letter. This Data Security Breach Notice Letter guidance document from Hutnik, Kelley Drye & Warren LLP provides guidance for companies facing the need to write notification letters.
Consider the required “tone” for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient’s feelings. Empathy and emotional intelligence are important leadership skills for managers.
To learn more about emotional intelligence, read this definition of Emotional Intelligence. Then, read about three types of empathy: https://www.verywellmind.com/what-is-empathy-2795562
The letter should be between 200-250 words and written concisely so the explanation is clear and not overly technical. The point is to ensure guests that the situation is under control and that you’ve taken steps to make sure they can feel confident that their information is safe. Remember accountability and empathy in your letter.
Part 3
Cybersecurity Issues for Business Travelers
Post your initial response of at least 150 words
Here interns are reflecting on cybersecurity issues that must be considered when employees travel for business. In your opinion, what are the security issues associated the technologies (cell phones, computers, etc.) used when traveling? In your opinion, is there a false sense of security that this is only a concern with international travel?
Part 4
Privacy Policies & Compliance Issues
Post your initial response of at least 150 words
After completing the course readings for the week, do additional research into the potential privacy, data security, and liability issues facing companies similar to Padgett-Beale. Find an event within the past three years that describes an issue related to this week’s course material and describe the event. And then, provide your opinion on what should be done to make sure it doesn’t happen again? For example, did the event result from a potential lack of employee training? If so, what type of training would you recommend?
For examples of guest privacy policies, please see these resources:
https://www.lhw.com/Privacy-Policy
https://www.ihcltata.com/privacy-policy/
https://www.fourseasons.com/privacy/
Part 6
Post your initial response of at least 150 words
Padgett-Beale’s Corporate Security Office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information.
In your opinion, what processes and procedures should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company’s intellectual property (consider data classification and marking, separation of duties, and least privilege).
Part 1 Before you begin working on this discussion post, please make sure tha
Part 1
Before you begin working on this discussion post, please make sure that you have read the Week 1 readings!
Welcome to Padgett-Beale and your first week as a management intern.
The Chief of Staff will be hosting a working lunch this week for your group of interns. In addition to the usual introductions and “getting to know you” discussions, you’ve been advised that there will be a discussion of the following article.
Seasonal Employee Security Risks: Present Danger, Proactive Defense
Each intern has been asked to write and bring a discussion paper containing their written responses to the following questions:
What steps can (should) managers take to reduce security risks associated with hiring seasonal or temporary employees? (Consider whether or not the Secure Computer User training course would be appropriate for these employees.)
How can managers show leadership in the area of cybersecurity defenses and best practices?
Consider the ways in which these types of companies are likely to use seasonal employees and the types of digital assets / information to which these temporary employees may have access.
Part 2
Responding to Guest Concerns about Cyberattacks
your internship assignment is with the company’s Guest Relations office.
You have been asked to draft a letter to guests to address concerns about the impacts of possible cyberattacks. Recently there have been news reports describing cyberattacks on the hospitality industry. This letter should reassure guests that the company is taking positive steps to protect guest privacy. Consider the technical and people perspectives.
There are legal requirements for such a letter. This Data Security Breach Notice Letter guidance document from Hutnik, Kelley Drye & Warren LLP provides guidance for companies facing the need to write notification letters.
Consider the required “tone” for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient’s feelings. Empathy and emotional intelligence are important leadership skills for managers.
To learn more about emotional intelligence, read this definition of Emotional Intelligence. Then, read about three types of empathy: https://www.verywellmind.com/what-is-empathy-2795562
The letter should be between 200-250 words and written concisely so the explanation is clear and not overly technical. The point is to ensure guests that the situation is under control and that you’ve taken steps to make sure they can feel confident that their information is safe. Remember accountability and empathy in your letter.
Part 3
Cybersecurity Issues for Business Travelers
Post your initial response of at least 150 words
Here interns are reflecting on cybersecurity issues that must be considered when employees travel for business. In your opinion, what are the security issues associated the technologies (cell phones, computers, etc.) used when traveling? In your opinion, is there a false sense of security that this is only a concern with international travel?
Part 4
Privacy Policies & Compliance Issues
Post your initial response of at least 150 words
After completing the course readings for the week, do additional research into the potential privacy, data security, and liability issues facing companies similar to Padgett-Beale. Find an event within the past three years that describes an issue related to this week’s course material and describe the event. And then, provide your opinion on what should be done to make sure it doesn’t happen again? For example, did the event result from a potential lack of employee training? If so, what type of training would you recommend?
For examples of guest privacy policies, please see these resources:
https://www.lhw.com/Privacy-Policy
https://www.ihcltata.com/privacy-policy/
https://www.fourseasons.com/privacy/
Part 6
Post your initial response of at least 150 words
Padgett-Beale’s Corporate Security Office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information.
In your opinion, what processes and procedures should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company’s intellectual property (consider data classification and marking, separation of duties, and least privilege).
Part 1 Quick Start Guides write a quick start guide. This discussion topi
Part 1
Quick Start Guides
write a quick start guide. This discussion topic is designed to help you become more familiar with what a quick start guide is and what its function is in technical writing.
To learn about quick start guides, please examine the three resources provided in Content in week 3:
What is a Quickstart Guide?
Quick Reference Guides Right Where You Need Them
Technical Writing Tips: The 80/20 Rule
You might also benefit from looking at the Sample Quick Start Guides in Learning Resources in week 3. While these quick start guides are longer than the one you will be writing, they present different strategies for incorporating text and images to accommodate their users.
Then answer the following questions. Your answers can be 2-3 sentences:
Most quick start guides are one page long. They have to be one page so that the user can look at them at a glance. What are some of the challenges to reducing a set of instructions of, for example, 3-4 pages into one page?
How does the 80/20 rule relate to the usefulness of quick start guides?
In your experience, when you purchase a product or a new piece of software, do you tend to use the user manual more, or do you tend to use the quick start guide more? Why?
Part 2
Preparing for WA4, the Report to the Supervisor
Please read the instructions for that assignment. Then answer the following questions:
You have just been hired as Assistant Manager at Work ‘N Suds. Please write a one-paragraph (3-4 sentences) summary of the problems you see in the company, according to the scenario.
In UMGC’s OneSearch interface, find one article on the concept of cross-training for employees in an organization. Keep in mind that some articles might spell the term with a hyphen (cross-training) and some might spell it without a hyphen (cross training). Provide the author(s) and title of the article.
From your search from task #2 above, select Resource Types, then select Articles, and then select Peer Reviewed (Scholarly) Journals.
Select one article in your search list and provide the author(s) and title of the article. If you do not see any hits, reword your search terms. If you still receive no hits after rewording your search terms, then indicate what search terms you used.
Select one of the other concepts mentioned in the writing assignment instructions (mandatory vacations, cyberscurity in video surveillance systems, handling of credit cards, or any other concept). Then, in UMGC’s OneSearch interface, find one article on this concept. Provide the author(s) and title of the article.
This question involves listening to a part of the podcast, “Cyberbit Podcast Episode 1: The Unspoken Skill-Gap in the Cybersecurity Market,” which features Mr. Adam Bricker, former co-founder of Carolina Cyber Center and Mr. Sharon Rosenman, Chief Marketing Officer at Cyberbit.
The segment of the podcast we will listen to is from the 48:00 mark to the 50:30 mark. In that segment, a participant asks a question about writing in the cybersecurity field. The following link takes you directly to that question and Mr. Bricker’s response:
The Unspoken Skill-Gap in the Cybersecurity Market, 48:00 mark(https://www.youtube.com/watch?v=1-IMz_EXcas&t=2880s)
Mr. Bricker describes the type of technical communication that individuals in the cybersecurity field need to be able to produce.
How does his description fit the scenario with Mark Carman and Work ‘N Suds? In other words, who is the audience for writing assignment #4, and how does Mr. Bricker’s explanation align with the scenario?