Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Blog

January 24, 2024
January 24, 2024

Data Security & Backup

Cyber security is a universal challenge with need for critical data protection a fundamental function of every computer system to avoid data hacking, access to data as well as manipulation and interference. This paper explains about the possible measures of securing key data in the computer systems against hacking, recommended frequency for critical data back up as well as the devices used for data back up and safe storage of the backups against interference.

Data Security & Backup

Data Security & Backup

Firstly, is the use of Virtual Desktop Infrastructure (VDI), a computer virtualization technique in which the computer operating system controls and is conducted in a data center. Key data is secure because all data is stored in the data center, not in the endpoint device. Secondly, use of Virtual Private Network (VPN) a network security measure that encrypts data passing through it by creating a tunnel using security protocol hence hackers and ISPs cannot access key data (Harvey, Douglas & Gillian 24). Thirdly, hardware data security can be accomplished through disk encryption which prevents read and writes access to critical data as well as data masking a process through which original data is hidden in random characters or codes. In addition to that the use of very strong passwords which consists of a combination of characters and numbers with at least 8 to 12 characters long helps secure data stored in both hardware and software devices.

Data Security & Backup

The next stage is data back up, it is recommended to be undertaken weekly to avoid data loss due to a violation of data security. Notably, in the event of data loss one still has access to it by restoring the backup, it also avoids data being compromised. To achieve this, Automatic software options are available that one can use set to a backup at a selected time of the day or week such as cloud computing (Harvey, Douglas & Gillian 45). Data Backup can be performed manually on hard disks, USB jump drive, burned to a CD or DVD which should be stored offline. Safe data storage is an essential part of data security. Cloud back up services puts valuable information in an offsite repository that never goes offline and is available from anywhere. Finally, online sites such as Google Drive platform as well as Dropbox enable backup diversification of critical data.

To sum up, key data safety is a priority for all individuals. It is recommended that one should back up critical data frequently using software such as cloud computing for real time access as well as online sites such as google drive and drop box which offers security against hacking. MLA.

Works Cited

Harvey, Douglas Ross, and Gillian Oliver. Digital curation. ALA Neal-Schuman, 2016.

January 24, 2024

Constitutional Protection – Individual Rights

Introduction

Protection of individual rights elaborated in the bill of rights is facilitated by the constitution through the incorporation of the due process of law, the state of action doctrine and the equal protection clause (Brennan and William 56). The doctrine of due process in the 14th amendment ensures the state will not dispossess an individual of liberty, property or life unaccompanied by application of the necessary procedure of legislation. Notably, the doctrine of the expected process of law lays hold of rights in the bill of rights and relates them to the State. Secondly, the state of action doctrine refers to any government action in this case local governments are considered arms of the state. It acts as a backup plan to the bill of rights in coverage of private conduct. The state of action clause empowers Congress to pass laws that apply constitutional standards to private conduct. Finally, equal protection clause undertakes constitutional mandate to protect citizens from discrimination based on race or disability notwithstanding other factors. The doctrine offers legal guarantee that no group or person will be repudiated legal protection that is enjoyed by similar groups or persons.

Constitutional Protection - Individual Rights

Constitutional Protection – Individual Rights

Individual liberties refer to the rights of each person to pursue goals and life without constraint from other people or the government (Monk and Linda 7). Individual rights include liberty to live, liberty to freedom, right to privacy, liberty to pursue goals and dreams, liberty to seek happiness, right to protect oneself and one’s family, liberty to think, speech, work and right to worship. Justice, on the other hand, is a legal system which protects both legal and natural rights as well as punishing wrongs using fairness. The bill of rights is a conventional statement of the civil and legal liberties of the people of any state, federation or country (Monk and Linda 13). The first eight amendments are procedural and essential individual rights. The 9th and 10th encompass amendments of general rules of the association between citizens, states and the federal government.

The constitution does a good job of protection of individual rights because, first of all, it is a fundamental task that aims at creating a free society, the core of American democracy where each right bears a responsibility. Prejudice and the repression of rights are the incentives of instability (Freeman 21). The constitution also eliminates doctrinal confusion by providing a mechanism for interpretation of what constitute rights hence facilitating the protection of such rights. Individual liberties are crucial for free markets, protection of these rights such as liberty to own private property and the right to judicial remedy are prerequisites for promoting economic growth, entrepreneurship and investment.

Constitutional Protection – Individual Rights

SECTION I: THE DUE PROCESS CLAUSE

The basic requirement of the legal due process is that an individual ought to have a chance for hearing before deprivation of life any important property or liberty. Legal due process lays hold of liberties and relates them to the state. In the case of Gitlow v. New York, it was established by the Supreme Court  that the First Amendment pertaining liberty to free speech as among the liberties safeguarded by the Due Process Doctrine. As per the Supreme Court, both the federal government and state government should not deny an individual his statutory right to speech. Supreme Court decisions are regarded to have greatly affected every other area, criminal civil of state action to the extent of affecting state court judges. However, both state and federal courts are ought to be custodians of individual liberties.

The expected process of law provision relates during instances which the state acts against citizens when some features unique to them are involved. Before the government s terminates a welfare recipient’s benefits, the government must provide a full hearing before the litigation officer. The essential expected process offers the provision of law on things such as the right to marry, parenthood and work in an ordinary kind of job. Decisions enforcing the guarantee of the due process explains the importance of property and liberty in light of situations in existence in modern society. Property embraces substantive presumptions such as driver’s license and the legal entitlement to minimal economic aid, workingman’s wages as well as continued ownership and consumption of commodities purchased under conditional sale contracts.

Constitutional Protection – Individual Rights

The right to a fast and public litigation undertaken by an equitable jury as well as the right to have a mandatory procedure for obtaining witnesses is fundamental for the due process. The conception of liberty recognizes undeniable propositions that prisoners and paroles retain some vestiges of human dignity, hence prison and parole process ought to provide some form of notification and hearing prior to confinement in solitary or the renunciation of parole.

The Supreme Court finds no autonomy interest in the reputation of a person who has on no occasion been tried and thus not convicted who bears a public brand of a criminal by the police without benefit of notice.

Activities withholding the due process are against the law. To illustrate this, concepts of liberty and property recognize that under modern circumstances, incumbent public employees may not have their logical expectation of extended employment, and school children liberty to a public education revoked without notice and opportunity to be heard.

Constitutional Protection – Individual Rights

SECTION II:  EQUAL PROTECTION CLAUSE

The equal protection doctrine needs states to execute equal protection. Equal protection compels a state to govern fairly not draw distinctions between persons solely on differences that are peripheral to a genuine government aim. As such it is the statutory assurance that no individual or group will be repudiated constitutional protection that is enjoyed by similar individuals or groups (Barnes 394). The Supreme Court in use of the uniform safety of the United States federal law currently prohibits discrimination in housing based on religion, race, color, origin, sex, national or handicap, conversely, it permits discrimination against children only in eligible elderly citizen population. Status and rights of aliens, access to courts, abortion and voting requires equal protection.

Political process concept under equal protection doctrine prohibits admissions based on racial inclination by implementing statutes benefitting racial minorities to an increasingly cumbersome political process than that imposed on other statutes. The state is prohibited from inflicting extra burdens beyond those of political process on laws benefitting minorities (Barnes 393). Correspondingly, the Supreme Court ratified a state constitutional amendment that, inter alia, forbid public universities from using race as a component in the admissions process. Plurality’s test consequences count as racial damages in addition to being imprecise requiring the kind of race-based examination that the five conservative justices have consistently pursued to abolish. The concept applies firm investigation when the political procedure and decision-making methods used to address racially responsive statute is singled out for strange and unfavorable treatment.

Constitutional Protection – Individual Rights

In the case of City of Cleburne v. Cleburne Living Center, Inc., it was held by Supreme Court that less privileged individuals are only qualified to logical basis review under the equal protection clause. State laws still prejudice against people with disabilities, most individuals with a psychiatric disorder in voting, commitment proceedings, provision licenses as well as welfare benefits.  Statutes by the federal governments are implemented so as to confront exclusions created by states’ laws (Waterstone and Michael 541). The first title of the Americans with Disability Act forbids prejudice on less privileged individuals in work set up and ensures that institutions accommodate them at their cost hence promoting inclusion of persons with disabilities in the work environment. Additionally, section 504 of the Rehabilitation Act disallows prejudice against less privileged people in structures receiving federal economic assian stance.

In the light of the equal protection clause, people with disability ought to be protected against discrimination and should access equal opportunities as other citizens. Political process doctrine protects individual rights of racial minorities and prohibits racial based discrimination. The doctrine offers a constitutional guarantee that the state shall practice equal protection to all citizens.

Constitutional Protection – Individual Rights

SECTION III: STATE OF ACTION DOCTRINE

The state of action requirement constitutes the legislative amendments protecting individual liberty specifically the bill of rights as well as the 14th amendment often described as prohibitions against state action. Litigations alleging statutory violations on state action must prove how the state or federal government is liable for violations of such rights. To begin with, Congress is prohibited from making a law infringing upon the liberties of religion as well as speech (Mack and Kenneth 351). No state shall contravene the right of fair litigation by an impartial jury, nor the liberty of conscience. In spite of this, the doctrine is viewed as contradictory and inconsistent. However, this doctrine offers the support framework for other doctrines such as due process of law and equal protection clause which all are mechanisms for the protection of individual liberty by the legislation. Additionally, state action clause helps in mitigating the state’s power against infringement of the individual rights.

The 14th Amendment provides that people and private institutions do not have a statutory right to run and operate devoid of legislative norms mandating fairness, tolerance, and equality (Mack and Kenneth 370). For instance, privately owned organizations do not have a legal right to discriminate on the basis of race. State action clause does not defend the rights of people to be at the liberty of state control but rather empowers rights of the citizens to democratically establish the society they wish to live in.

Constitutional Protection – Individual Rights

All states ought not strip of any citizen life, property as well as liberty in the absence of application of expected process legislation or renounce any individual in the range of its authority the uniform conservation of the laws. The government ought not to invade the fundamental rights of the people because the state is mainly a servant of its citizen based on the priority of constitutional values (Mack and Kenneth 364). The rights of the citizen rank above the powers of government thus State’s action is subject to people’s fundamental rights. Constitutional law is central to United State’s society and our system of law. It forms a democracy governed by the majority rule with protection against the majority rule if unconstitutional. The undeniable rights of fairness, liberty and equality are shielded from interference even when the majority of the people wish to violate those rights. The duty to execute its prohibitions against state action responsibility is vested with the courts.

To sum up, the political question doctrine supplements situations where the constitutional law does not relate or where it occurs in a mild form. Additionally, the 14th Amendment clause limits powers of the state against any instances of violation of individual rights.

Constitutional Protection – Individual Rights

Conclusion

Protection of individual liberties is achieved via the application of due process of law, the state of action doctrine and the equal protection c0ncepts as explained above. (Brennan and William 56). The state ought not to dispossess an individual of liberty, life or property without application of the due procedure of law. The state of action doctrine acts as a backup plan to the bill of rights in coverage of private conduct and also empowers Congress to pass laws that apply constitutional standards to private conduct. Finally, equal protection clause undertakes constitutional mandate to protect citizens from discrimination based on race or disability offering a constitutional guarantee. MLA.

Works Cited

Freeman, Michael. Human rights. John Wiley & Sons, 2017.

Brennan Jr, William J. “State Constitutions and the Protection of Individual Rights.” Harvard Law Review, vol. 90, no. 3, Jan. 1977, p. 489. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=bth&AN=8604796&site=ehost-live.

Barnes, Jeb. “Enforcing the Equal Protection Clause: Congressional Power, Judicial Doctrine, and Constitutional Law.” Political Science Quarterly (Wiley-Blackwell), vol. 132, no. 2, Summer 2017, pp. 393–394. EBSCOhost, doi:10.1002/polq.12648.

Waterstone, Michael E. “Disability Constitutional Law.” Emory Law Journal, vol. 63, no. 3, Jan. 2014, pp. 527–580. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=aph&AN=94773927&site=ehost-live.

Mack, Kenneth W. “Civil Disobedience, State Action, and Lawmaking outside the Courts: Robert Bell’s Encounter with American Law.” Journal of Supreme Court History, vol. 39, no. 3, Nov. 2014, pp. 347–371. EBSCOhost, doi:10.1111/j.1540-5818.2014.12053.x.

Monk, Linda R. The Bill of Rights: A User’s Guide. Hachette Books, 2018

January 24, 2024
January 24, 2024

Han & Qin Chinese History

Introduction

Qin Shi was an emperor during the Qin regime. The period features advanced technology in military weapons and education. The dynasty came to eminence after conquering adversary states such as the Zhou regime. On the other hand, Emperor Gaozu established the Han regime. He adopted a majority of Qin’s dynasty policies and customs.  Han Wudi revolutionized the dynasty before it collapsed under Xian’s leadership. This paper discusses the Han and Qin periods of Chinese history.

The Qin Regime

Unification of Ancient China by Qin Shi Huangdi

Key events during his tenure led to the unification of China. It can be argued that the Great Wall of China offered protection to people living in China from the northern invasion, especially the Mongols. Its construction united them for an ordinary course. Also, the construction of the Lingqu canal connected Canton Area to the Yangtze River basin through river Li offering excellent mobility (Jichun && Xiaocong, 2018). Notably, appointments were made on merit rather than hereditary. Such a state of affairs offered many people opportunities for employment.

Han & Qin Chinese History

Ideally, Qin established new ways of doing things that would act as the norm across the dynasty. Such innovations and ideas involved the standardization of coins, weights, and measures.  The only legalized coin for trade purposes was bronze in nature, rounded and with a hole in the center in the shape of a square. Additionally, writing and modes of transport were also standardized. Standardization of writing enabled bureaucrats across the regime to read documented communications (Sanft, 2014). It also enabled the leadership to overcome cultural barriers between different provinces hence uniting China. The preferred mode of transport was chariots with axle widths. Such standardization efforts resulted in a standard way of doing this that united ancient China.

Han & Qin Chinese History

Government structure

Qin highly relied on bureaucracy in his administration. There was a great chain of command with the hierarchy of officials, both military and civil, all serving the first emperor. The division of China into larger provinces was witnessed, with each province being assigned top military officials rather than members of the royal family (Sanft, 2018). The establishment of a police force within his government led to the seizure of all personal weapons that were formerly owned by members of the warring communities. New laws and policies were implemented that led to the end of Feudalism. Qin significantly invested in the military; they advanced weaponry from bronze swords to sharp iron swords. Such a move resulted in the government having much power and control.

He structured centralized political sovereignty by gaining control over peasants who formed the most significant part of the workforce. The rich were relocated to the capital to get the support of the high social class. Notably, he removed power from the noble class to deal with the disloyal nobility of the Zhou was a move to galvanize his authority. He also developed a postal system as well as conducting a census of the people. Standardization of currency was seen as a means of exerting control over the dynasty. During his tenure, irrigation systems and highways were built (Jichun && Xiaocong, 2018). The Great Wall of China, for example, helped protect the people of China from the northern invasion, especially the Mongols.

Han & Qin Chinese History

Legalist Philosophical System

          Legalism was the legitimate philosophy resulting in other philosophies being suppressed, such as Confucianism, Daoism, and Mohism. Legalism proclaimed that a stable state was a necessity to diminish human self-interest. He was responsible for the burning of philosophical texts and history books except those of Qin State. More than four hundred and sixty Confucian scholars were buried alive. Such events ended many schools of thought. Under the help of Li Si, the Prime Minister, the writing system was standardized into consistent shape and size across the country. Efforts mentioned earlier would unify Chinese culture for ages. Legalism greatly denounced the Feudalism and called for harsh retribution for disobedience of the first emperor.

Standardizations

Standardization was mainly for coins, weights, and measures, writing as well as modes of transport. The only legalized coin for trade purposes was bronze in nature, rounded and with a hole in the center in the shape of a square. Standardization of writing enabled bureaucrats across the regime to read documented communications (Sanft, 2014). It was institutionalized by Prime Minister Li Si. It also enabled the leadership to overcome cultural barriers between different provinces hence uniting China.

The written language during the Qin dynasty was logographic.   The preferred mode of transport was chariots with axle widths. Additionally, the commissioning of the legalist philosophical system standardized operations that relied on the feudal system.  Such standardization efforts resulted in a standard way of doing things that united ancient China.

Han & Qin Chinese History

Theoretical Reasons for the dynasty to last 15 years 

One of the key reasons as to why the regime did not last for long can be attributed to the overreliance on brutal methods of maintaining power. Such brutal techniques influenced defiance from the people, especially the conscripted field workforce that consisted of farmers and peasants.

One theory explains that Qin was overly suspicious of his death, and as such, he survived many death attempts. According to Huang (2017), his death was as a result of his obsession with immortality, where he died of poisoning from the immortality concoction made by his alchemists and sorcerers. The Qin Regime lasted for 15 years between 221BCE to 206 BCE.

Chaos and the Rise of Common Man Rebel Liu Bang (256 – 195 BC)

Qin died on a trip to the eastern regions of his territory as reported where he had gone to obtain a panacea from magicians in Tao. He was escorted by Zhao Gao, the Chief Eunuch, and Li Si, the Prime Minister (Lin, Peach && Fang, 2019). Zhao Gao and Li Si concealed information regarding death until their return, where they changed the will to put Huhai, son of Qin, on the throne as he could be easily manipulated. Huhai was then renamed Qin Er Shi, he executed several princes and ministers as well as arresting messengers who brought bad news.

He was extravagant as he commissioned several building projects, increased taxes, and enlarged the army. It led to chaos, which resulted in officials being attacked uprising of revolt armies, several people declaring themselves kings of the territories they seized. Li Si and Zhao Gao fell out, which led to the beheading of Li Si. Zhao subsequently compelled Qin Er Shi to execute suicide for his failings in leadership. Such turn of events led to Ziying, nephew to Qin Er Shi, to assume power. Ziying prosecuted Zhao Gao. However, he was unable to calm the unrest that had rapidly developed, with several state officials proclaiming to be kings of various regions they were assigned.

Han & Qin Chinese History

   Ziying, therefore, announced himself the overall king above the other kings. Due to his incompetence, a famous revolt broke out in 209 BCE. The rise of Liu Bang, the rebel, took place during the revolt where Ziying was defeated by Chu rebels and surrendered in 207 BCE under the leadership of Liu Bang.  Xiang Yu was the group leader of the Chu Rebels, and as such, he executed Ziying and later destroyed the Qin capital.

The Han Regime

Liu Bangs founding of the great Han Dynasty (206 BCE to 220 AD)

After the execution of Ziying, Liu Bang was given the region of Han River Valley to administer.  He waged war against local kings, successfully defeating all the surrounding kings (Lin, Peach && Fang, 2019). It was then that he betrayed Xiang Yu and decided to revolt for three years. Xiang Yu committed suicide in 202 BCE and asserted himself Emperor Gaozu of the established Han regime. He adopted a majority of Qin’s dynasty policies and customs.

Philosophy and Strategies used by the Han Dynasty in its Initial phase (Western Han)

Philosophically, the Han Empire practiced many of the Qin policies. Legalist and the provincial rule was practiced but in a more flexible approach that integrated Confucianism and Daoism in making state policies and decisions.  Strategically, Emperor Gaozu first developed civil service. He identified educated individuals whom he consulted on developing and administration of the empire. Consequently, he institutionalized books, schools, and examinations to form a meritocratic tool upon which the hiring of government officials would be established. He also established the imperial capital at the city of Chang’an. Its strategic location was favored because all major roads converged there.

Han & Qin Chinese History

Compilation of the Huai Nanzi

It comprises of ancient Chinese script composed of scholarly articles of a series of debates held at Liu An’s court. The essays integrate concepts of Daoism, Confucianism, and Legalism aimed at finding the required qualifications for the order both socially and politically. The text summarizes that social order requires a perfect ruler. The texts act as a handbook for reference by future leadership.

How Han Wudi Transformed China

Han Wudi revolutionized ancient China in two fronts, both through economic industrialization and military feats. Firstly, he established government industries specializing in salt, wine and iron, transportation, and service delivery (Lin, Peach && Fang, 2019). Secondly, he institutionalized income tax and forth with its government control. The establishment of farming reforms that led to widespread agricultural practice was part of the reforms.

Han Wudi made changes in the education system by creating a civil service examination as well as establishing an Imperial University. Additionally, he established the Silk Road on his diplomatic missions to Central Asia and the Mediterranean regions that led to the expansion of trade routes economically improving the Han Dynasty (Lin, Peach && Fang, 2019). Some of his military feats are evidence by the doubling of the size of the empire conquering Korea, parts of Turkistan, Manchuria, northern Vietnam as well as Inner Mongolia. Such expansion resulted in improved trade contacts and expansion of the Silk Road.

Han & Qin Chinese History

Accomplishments of Han Wudi in Making Confucianism State Philosophy

            Emperor Wu much experimented with socialism, resulting in the reassembling and transcription of Confucian doctrines. The aggregation of ethical Confucian ideas resulted in it becoming a single official philosophy. New ideas were developed that enabled that comfortably allowed individuals to accept social responsibility and position and justified their view of state power. On the other hand, the ideals put on pressure to the state to act impartially towards the citizens. The state relied on the proceeds of agricultural activities and land taxes, which encouraged individuals to work hard.

Personal life and Dark Side of Han Wudi

Emperor Wu, also known as Han Wudi, was known for his pride that made him such a successful and feared warlord. He boasted in his successful military and economic feats and never took accepted failure in his endeavors (De Crespigny, 2017). He had a great passion for horses, preferably from the Fergana region.

The mystic was that they were blood sweating due to skin infection caused by parasites. Han Wudi considered the bleeding of the horses as a sign of grace from heaven. He was viewed as harsh, cruel, and demanding by the army captains from his executive orders. Like Qin Shi, he was lured by the pleasure of immortality. His final years were full of regret and withdrawal due to the death of his son and that of his wife, which he played a part.

Han & Qin Chinese History

Role of Daoism in Mortally Weakening the Dynasty during the Yellow Turbans Rebellion

The Yellow Turbans Rebellion took place during the Eastern Han period of the dynasty under the stewardship of Emperor Ling.  The religious movement of Daoism created an impression that the government had lost its power (Wicky, 2018). The revolution was led by Zhang Jue, a Daoist religious leader. In his teachings, he spread the vision he had seen that a new dynasty referred to as the yellow haven was going to rule for six decades (De Crespigny, 2017). Due to his fame for healing the sick, the vision gained much faith among the followers coupled with the exploitation of peasants from the yellow river region.  It was a source of inspiration for the rebellion.

The Decline of the Han Regime

The Han Regime ended shortly after the Yellow Turbans Rebellion. It occurred during the regime of the last emperor, Xian. Government institutions were destroyed, resulting in regional regimes headed by warlords (Wicky, 2018). Cao Cao made the last efforts to reunite the Han Dynasty is one of the warlords. He was able to reunite the empire under Xian’s leadership but was defeated by war between his troops and allegiance of the other two regimes at the Battle of Red Cliffs. Cao Cao had kidnapped Xian the young emperor forcing him to abdicate the throne to his son. However, it was too late as the dynasty had split into three kingdoms.

Han & Qin Chinese History

Conclusion

Both Qin and Han dynasties have similarities in that they helped unify china through policies and philosophies. The significant difference is that the Qin regime relied on legalism while the Han regime implemented Confucianism. Both dynasties relied on agriculture for economic purposes. However, the Han regime diversified in trade and industrialization. In my opinion, the Han Regime was better than the Qin regime.

Reference

(APA referencing style)

Sanft, C. (2014). Communication and Cooperation in Early Imperial China: Publicizing the Qin Dynasty. SUNY Press.

Huang, J. (2017). Research on the Causes of the Destruction of the Qin Dynasty. In 2017 3rd International Conference on Economics, Social Science, Arts, Education, and Management Engineering (ESSAEME 2017). Atlantis Press.

De Crespigny, R. (2017). Portents of Protest in the Later Han Dynasty: the memorials of Hsiang K’ai to Emperor Huan. Faculty of Asian Studies in association with Australian National University Press.

Sanft, C. (2018). The Qin Dynasty. In Routledge handbook of early Chinese history (pp. 146-159). Routledge.

Lin, C., Peach, T., & Fang, W. (Eds.). (2019). The Political Economy of the Han Dynasty and Its Legacy. Routledge.

Jichun, Y., & Xiaocong, Z. (2018). On Economic Development of Agriculture, Industry, and Commerce in the Early Qin Dynasty. Agricultural Archaeology, (1), 7.

Wicky, W. K. (2018). The Collapse of China’s Later Han Dynasty, 25-220 CE: The Northwest Borderlands and the Edge of Empire. Routledge.

January 24, 2024
January 24, 2024

Cybersecurity & Safety – UAE

Introduction
Until recently, cybercrime and the danger of data theft were seen to be problems only faced by industrialized nations. However, as digitalization in both government and business increases, countries in the Middle East are increasingly coming to appreciate the need of cybersecurity preparation. When it comes to the pace of digital consumer adoption, the United Arab Emirates is among the world top countries. These factors, in addition to consumers casual attitude toward online security and the absence of sufficient cybersecurity safeguards in critical
industries, make the United Arab Emirates an interesting target for cybercriminals. While official statistics on the frequency of cybercrime in the United Arab Emirates are hard to come by, reports on waves of crippling malware assaults and private sector studies provide light on the scope of the problem. This paper will use three indicators to assess the current status of cyber readiness and security measures in UAE: the economic costs of cybercrime, the vulnerability of the human target, and the development of the national cybersecurity plan.

Cybersecurity & Safety - UAE

Cybersecurity & Safety – UAE

Literature Review
Since cyber-attacks on the UAE's financial institutions and government organizations became a major problem in 2012, 2013, and 2014, cybersecurity has been at the center of policy formulation and defensive strategy in the UAE. The United Arab Emirates (UAE) planned to increase its expenditure on homeland security by more than 33 percent, reaching more than $10 billion by 2024 (Siyam & Hussain, 2021). Cybersecurity in the country has improved because to increased funding, yet many experts still believe it is not sufficient. The United Arab Emirates (UAE) is an attractive target for state produced information collecting activities because to its dependence on the Internet of Things and an increasingly connected population (Gibbs, 2020). Specifically, the cyberattack capabilities of Iran and Israel pose serious risks to the UAE.   The United Arab Emirates (UAE) has increased its investment in cybersecurity and is planning to establish a cyber command as part of its tactical defense strategy.

Cybersecurity & Safety – UAE

According to Al Shamsi, 2019, the United Arab Emirates (UAE) is experiencing a shortage of competent cybersecurity professionals in the business and governmental sectors to that which is being experienced worldwide. The government has taken on longer-term projects, such as the construction of the Information Security Research Center (ISRC) at the Khalifa University, which provides the only MSc and PhD degrees in cyber security in the country, and internet safety courses aimed at young people and children. The United Arab Emirates (UAE)
standing as a regional digital pioneer is largely attributable to the government encouragement of innovation and the use of technology.

FedNet was developed by the United Arab Emirates (UAE) to give all branches of the federal government quick and easy network access to a shared pool of customizable computer resources. One of FedNet many benefits is the improvement it brings to cybersecurity in the United Arab Emirates thanks to its robust and reliable design. This is accomplished by way of an encrypted private network in the cloud using Multiprotocol Label Switching (MPLS). According to AlDaajeh et al. (2022), FedNet staff must keep a watchful eye on the network at all times, looking for signs of wrongdoing and acting swiftly to correct any problems they find. For FedNet security events, a Security Information and Event Management (SIEM) system is run by a security operations center (SOC) that is staffed around the clock, every day of the year. Multiple more initiatives are being undertaken by the UAE to keep and improve cybersecurity.

Cybersecurity & Safety – UAE

Research Design Methods
This research will employ a qualitative approach. Qualitative data will be used in the analysis and description of the legal framework and its historical evolution of cyber security and safety in the UAE. Data collected from sources such as yearly reports, articles in books, journals, and newspapers, etc. will also be used to conduct a study of the impact of cybercrimes and the legal framework for compacting them in the UAE. The informational resources that will be used are electronic resources, such as articles, books, and website content. The research process will
involve using both primary and secondary resources. The study will also analyze one of the top organizations in the country and identify whether the government has put in place enough cyber security measures.

Conclusion
The United Arab Emirates must be prepared to take on a higher load of cyber-attacks as it pushes for more digitalization and innovative applications of technology across all aspects of society, including e-government, the Internet of Things, and online banking. The United Arab Emirates (UAE) has been a prime target for cybercriminals because to lack of policies and the country widespread usage of such technology and the internet. Increasing connection increases susceptibility, and more sophisticated cyberattacks pose a threat to individuals and businesses
alike in today interconnected world. The UAE should accelerate the rate at which it implements cyber security policies and safety measures.

Cybersecurity & Safety – UAE

References ( APA referencing style.)
AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The
role of national cybersecurity strategies on the improvement of cybersecurity
education. Computers & Security, 102754.
Al Neaimi, A., Ranginya, T., & Lutaaya, P. (2015). A framework for effectiveness of cyber
security defenses, a case of the United Arab Emirates (UAE). International Journal of
Cyber-Security and Digital Forensics, 4(1), 290-301.
Al Shamsi, A. A. (2019). Effectiveness of cyber security awareness program for young children:
A case study in UAE. Int. J. Inf. Technol. Lang. Stud, 3(2), 8-29.
Gibbs, T. (2020). Seeking economic cyber security: a Middle Eastern example. Journal of
Money Laundering Control, 23(2), 493-507.
Siyam, N., & Hussain, M. (2021). Cyber-safety policy elements in the era of online learning: a
content analysis of policies in the UAE. TechTrends, 65(4), 535-547.

January 23, 2024
January 23, 2024

Management & Organizational Behavior (MGT255)

Case Study Assignment

The purpose of the case study assignment is to apply the concepts and theories you have learnt throughout the course to a particular business case. Each student needs to write a case study analysis report for an assigned case study (8-10 pages) excluding the title page and references. The written report includes two major parts: the case study summary which includes summarizing the case major problems and issues and relate them to the relevant theories and course concepts (2-3 pages). While the second part focuses on analyzing the case questions
and answering them critically (6-7 pages). Your answers for the case questions need to be in an essay format and to be supported by an academic evidence based on the literature review using as minimum of relevant 12 references (journal articles). The structure of the case study written report should be as follows:

Management & Organizational Behavior (MGT255)

Management & Organizational Behavior (MGT255)

Title Page: Course title, assignment title, student name, instructor name, date, etc. Please use the university’s formal template.
Table of Contents
Executive Summary: A coherent summary of the whole group project. It should provide the reader with a clear understanding of the report without having to look at any other part of the report.
Case Study Summary: Summarize the case major problems and issues and relate them to the relevant theories and course concepts.
Analysis and Answers of the Case Questions: Analyze and answer the case study questions in an essay format. Provide your recommendations based on practical and theoretical evidence.
Conclusion
A summary of the issues discussed. Your own conclusion based on the issues discussed on the report.
Reference list

Management & Organizational Behavior (MGT255)

APA referencing style will be used and no need for endnotes. The case study will be assigned by the instructor and the assessment weight is 30 marks and no oral presentation is required. Marking rubric of the case study assignment is provided at end of this document. The submission of the assignment will be through the blackboard and it is due in week 8 as stated in the blackboard and no late submission will be accepted.

The assignment needs to be typed, in the following format:
Font size 12 point, spacing 1.5, margins set at normal. The pages need to be numerated. In the content list page, numbers are to be given under the different sub-headlines. New paragraphs are to be marked by skipping a line, it is not to be marked by indentation. Headlines are to be written from the left margin, not centred.

January 23, 2024
January 23, 2024

SEC303 Introduction to Research Methods

Directions
The Research Proposal Presentation is an 8-minute verbal presentation based on a Power Point
presentation in which you will present your research proposal to audiences in our class.
Content.

Your presentation should demonstrate your ability to design and develop a research
proposal which defines the scope of your project, presents a literature review, contains
clearly defined hypotheses or research questions, explains the data, analytical tools and/or
research methods which will be used in the final project, and effectively communicates your
research project and discusses any relevant ethical considerations.
Deliverables
Students must upload submit a PowerPoint presentation (suggested 7 to 10 slides)
Sunday 9th April before 20:59pm.
o Verbal presentation during class time in week 13.
o Do not read directly from the slides.

SEC303 Introduction to Research Methods

SEC303 Introduction to Research Methods

Organization.

Students are free to organize their PPT presentations as they wish. If they
wish to follow a template, here is one for their guidance:
1. Title Slide
 Title of project
 Your name and student ID
2. Introduction
The Introduction sets the stage for what is to come and should provide the background and
rationale for the proposed project – what is this about and why is it important? It should clearly
contextualize the problem in one to three short paragraphs, and include a brief statement of
the problem. The Introduction should answer the following questions:
 Background of the topic (supported by literature)
 Research problem
 Need for your research (point out the research gap)
 Purpose of the study/importance (objectives)
 Research question/hypothesis

SEC303 Introduction to Research Methods

3. Literature Review
This section is a brief review of the relevant literature pertaining to the proposed
problem/project. Carefully select the articles you review to inform and/or support the need for
your project, for example:
 Five key findings from other research papers
 Connect those findings to each other and to your project
4. Research Design and Methods
This section should describe the proposed methodology and how you will conduct the project.
The proposed methodology narrative/paragraph(s) will include an explanation of the following:
 Research design (quantitative, qualitative or mixed methods)
 Data and data collection
 Methods (Detailed information about data collection tools)
 Justification of research methods / methodology (why do the selected research
methods suitable for your research)

SEC303 Introduction to Research Methods

5. Conclusion
The purpose of the conclusion is to wrap up your writing and reinforce the main idea that you
presented in the body of your proposal. By sure to include what will this research contribute to the
knowledge.
6. References
i. Or resources
Submission instructions
Deadline
Sunday 9th April before 20:59pm
Late submission will be penalized as follows:
Late submissions are allowed within a maximum of 5 working days of the deadline of the
assessment activity. The student grade is reduced by 10% for each working day during the
aforementioned 5-day period. If the assignment is submitted beyond the 5-day period, the student
receives a grade of 0 in the assessment activity in question.

SEC303 Introduction to Research Methods

Word limit
The PowerPoint should consist of 7 to 10 slides (suggested).
Format
The PowerPoint
References
Citation in the text and the Reference list that includes the sources for all materials cited in this
assignment. This list must follow the APA style referencing, and you should have carefully
proofread it to make certain that the style is followed consistently.

January 23, 2024
January 23, 2024

PAS204 Child Protection

Assessment 2 – Task: Video Assessment

Scenario

There has been an increase in online child abuse, grooming and cyber bullying taking place across the UAE.

Numerous parents, schools and children’s organisations have approached the Abu Dhabi Police to ask for their help in trying to prevent these types of crimes.

You have been requested to provide a video to be shown to Parents that helps them to be educated on the potential dangers of the internet and online abuse and how to protect their children. 

PAS204 Child Protection

PAS204 Child Protection

Task

The video should be clear and informative. It must be your own work.

All members of the group must contribute equally to the assignment.

It should be no more than 7 minutes long.

The marking guide (rubric) is detailed below so please make sure you review this.

Students will undertake an authenticity interview with the course instructor after submission.

References should be included at the end of the video.

Ensure that all producing, acting, and recording participants in the video assessment have given their permission to participate. If minors or non-Rabdan students engage as supporting actors, their faces must be blurred due to privacy concerns. Use APA referencing style.

PAS204 Child Protection

Your video must contain the following:

Clear information for Parents on the potential dangers to children when online. (CLO4) This could contain facts about online child abuse internationally.

Clear information and advice for Parents on how to keep their children safe online – both from cyber-bullying or potential predatory behaviour by online offenders. (CLO4)

Information for Parents about applications or controls they can put on their use in order to protect children. (CLO5)

Information for Parents on how to report potential child abuse or concerns (CLO5)

The powers of the Police to investigate the report. (CLO5)

Use APA referencing style.

January 23, 2024
January 23, 2024

SEC302 Applied Stakeholder Analysis

Individual Term Project Overview

Each student is required to write and submit a 1000-word (excluding cover page, table of contents and references page) essay for their assigned case project.

Students must submit/upload a Microsoft Word file and review the similarity score of their final submission prior to the due date. For the Assessment 3: Essay students must include the following sections:

INTRODUCTION [CLO4] (5 POINTS) – Recommended 50 words

Summary and background of the project including:

  • Overview of how the core problem has come into existence for the community or geographic region based on underlying factors;
  • The justification for undertaking this project and the benefit it will provide for the community and/or geographic region where it is being enacted.
  • Details about one (1) primary objective of the project. In other words, what does the project aim to achieve.

SEC302 Applied Stakeholder Analysis

SEC302 Applied Stakeholder Analysis

STEP 1.1 Stakeholder Analysis [CLO4] (10 POINTS) Recommended 300 words (Excluding Content from Power/Influence and Interest Matrix)

Discuss stakeholder analysis applying:

  • Stakeholder Power/Influence and Interest Matrix with placement of five (5) selected entities.
  • Students are required to select and summarize within the scope of the project the role of a minimum of five (5) stakeholders from the following sectors:
  1. One (1) national/federal level public sector stakeholder from the assigned country.
  2. One (1) local level public sector stakeholder from the assigned country.
  3. One (1) international non-profit sector stakeholder.
  4. Two (2) additional stakeholders from any sector of your choosing including but not limited to financial sector, grassroots citizen-led or otherwise

SEC302 Applied Stakeholder Analysis

Stakeholder Characteristics Target Group Selection [CLO4] (10 POINTS) Recommended 200 words (Excluding Content from Table)

In table form with supporting paragraph summary/details for the characteristics/capacities of each stakeholder including:

  • Justify one (1) reason each stakeholder is important to the project by indication of their tangible/intangible resource contribution OR span of influence;
  • For each stakeholder, one (1) implication that their involvement will have for benefitting the project;
    • Selecting the target group/industry (direct recipients and ultimate beneficiaries of the project’s implementation)

STEP 1.2 Problem Analysis [CLO4] (5 POINTS) Recommended 100 words

  • Assess the core problem associated with the project;
  • Summary of at least one (1) contributor to the core problem that is central to the project;
  • The impact that the core problem is having for the community or geographic region (e.g. economy, employment, critical infrastructure damage etc);

SEC302 Applied Stakeholder Analysis

Role Logical Framework [CLO2] (40 POINTS) Recommended 100 words (Information within the Role Logical Framework Table will contribute to the Essay word count)

  • Create a Role Logical Framework table for the project to include information associated with the four [4] column headings including (1) Project Structure, (2) Indicators, (3) Means of Verification and (4)

 Monitoring and Evaluation [CLO4] (10 Points) Recommended 150 words

  • Summarize one (1) aspect of the project to be monitored throughout the project timeline (5 points) indicating one (1) proposed methods/tools (5 points) to be used for monitoring.
  • Assess how the project is to be evaluated against the stated objective toward overcoming of the noted problem.

 CONCLUSION Recommended 100 words [CLO2=5, CLO4=5] (10 Points)

A summary of the project to include:

  • Details of key problem
  • Importance of stakeholder contributions
  • Benefit of project to the target group
  • Key indicators of monitoring and evaluation

GRAMMER, FORMATTING & REFERENCES [CLO2=5, CLO4=5] (10 Points)

*NOTE: Sources where information is obtained must be cited in APA format and listed in the References Section.

 

January 23, 2024
January 23, 2024

Heart of Darkness What exactly does Achebe think is wrong with? Discuss Chinua Achebe criticism in? What are examples of racism from Achebe’s story? What is an example of Conrads? Which period, event, culture, or ideology does this item represent? What does this item suggest about the culture/s associated with it? Who created it, and why? Or was it a notable event that happened here? Can we deduce any important info from the materials used to make it? How was it used? Did different people use it or value it in different ways?  Has its function changed over time? How or why?

Heart of Darkness

Discuss Chinua Achebe criticism in? What are examples of racism from Achebe’s story? What is an example of Conrads? Which period, event, culture, or ideology does this item represent? What does this item suggest about the culture/s associated with it? Who created it, and why? Or was it a notable event that happened here? Can we deduce any important info from the materials used to make it? How was it used? Did different people use it or value it in different ways?  Has its function changed over time? How or why?

Discuss Chinua Achebe criticism in Heart of Darkness? What are examples of racism from Achebe’s story? What is an example of Conrads What are examples of racism from Achebe’s story? What is an example of Conrads? Which period, event, culture, or ideology does this item represent? What does this item suggest about the culture/s associated with it? Who created it, and why? Or was it a notable event that happened here? Can we deduce any important info from the materials used to make it? How was it used? Did different people use it or value it in different ways?  Has its function changed over time? How or why? Use APA referencing format.

January 23, 2024
January 23, 2024

Asian Culture Which period, event, culture, or ideology does this item represent? What does this item suggest about the culture/s associated with it? Who created it, and why? Or was it a notable event that happened here? Can we deduce any important info from the materials used to make it? How was it used? Did different people use it or value it in different ways?  Has its function changed over time? How or why? create an identity for yourself based on a historically informed character from one of the societies in this week’s reading in Chapters 5 and 6 of the textbook, as well as the decide what society you would like to visit, choosing from among the societies in this week’s reading and civilization tour, and choose two of the following categories for comparing your home society to the one you are visiting:

Asian Culture

Asian Culture Which period, event, culture, or ideology does this item represent? What does this item suggest about the culture/s associated with it? Who created it, and why? Or was it a notable event that happened here? Can we deduce any important info from the materials used to make it? How was it used? Did different people use it or value it in different ways?  Has its function changed over time? How or why? create an identity for yourself based on a historically informed character from one of the societies in this week’s reading in Chapters 5 and 6 of the textbook, as well as the decide what society you would like to visit, choosing from among the societies in this week’s reading and civilization tour, and choose two of the following categories for comparing your home society to the one you are visiting:

Asian Culture Which period event culture or ideology does this item represent? What does this item suggest about the culture/s associated with it? Who created it and why? Or was it a notable event that happened here? Can we deduce any important info from the materials used to make it? How was it used? Did different people use it or value it in different ways? Use APA referencing format.