> Consider a mobile app that you make use of on your personal phone. List and d

> Consider a mobile app that you make use of on your personal phone. List and discuss 3 to 5 security risks that developers should consider when developing apps like this one.
Outline your plan addressing these issues and other issues. Need a 7-9 page APA-formatted paper with minimum of 9 peer-reviewed citations. Need proper introduction and conclusion included.
NO AI WORK!

  .1. What Big Five personality traits does Lorraine Monroe possess? 2. Which

 
.1. What Big Five personality traits does Lorraine Monroe possess?
2. Which traits of effective leaders does Lorraine Monroe possess?
3. Does Lorraine Monroe have the personality profile of an effective leader? And what does she say in response to businesspeople who continually ask her, “What makes a good leader”?  
4. How did “attitude” help change the performance of Frederick Douglass Academy?
5. How did Lorraine Monroe’s self-concept affect her leadership?
three to five page paper (excluding title, abstract, and reference pages). Include at least three peer reviewed sources found in the Potomac Library properly cited and referenced. Assignment should be APA compliance. 

 Address the six questions associated with the chapter four Case: Foxconn Techno

 Address the six questions associated with the chapter four Case: Foxconn Technology Group on  page 135 in a three to five page paper (excluding title, abstract, and reference pages). Include at least three peer reviewed sources found in the Potomac Library properly cited and referenced. Assignment should be APA compliance. 

Promoting cyber security helps secure data systems. In your journal, you will r

Promoting cyber security helps secure data systems.
In your journal, you will reflect on cyberattacks. Specifically, you will discuss attack vectors, risk management, network security risks, and attack prevention and detection.
Your journal entry should be three or more sentences per prompt and address the following questions:
What vectors might be most vulnerable to cyberattacks?
What can you do to help promote user awareness of security?
What is network reconnaissance, and why is it important to understand?
What are the main types of malware?

You have learned that an employee has missed the last two security awareness tr

You have learned that an employee has missed the last two security awareness training sessions. The employee perceived this training as having a low priority compared to their other responsibilities and thought there would be no new or relevant information relative to their role in the organization.
For your initial post, select one of the following and respond to it:
What changes could be made that would help build a more security-aware culture within the security organization? Justify your response.
What tactics or strategies could you employ to help shift people’s perspectives from reactive to proactive when it comes to security? Justify your response.
In your responses to your peers, address the following:
What would you do differently?
What additional recommendations would you have for the solution they provided?