Questions
After your successful engagement to develop privacy and personal data protection strategies for DAS, you have...

After your successful engagement to develop privacy and personal data protection strategies for DAS, you have been engaged by the Department of Health (DoH) to advise on the development of privacy and data protection for CovidSafe users. DoH expect up to 16 million Australian mobile users to download and use this app. DoH have announced that they will be using a major U.S. based public cloud provider to host the CovidSafe data, but claim that the data will always be under Australian Government control.

You are to provide a report to DoH that:

  1. Discusses the possible threats and risks to the security of user data on mobile phones, and in linked Cloud and financial accounts from the use of the CovidSafe app.
  2. Discusses the possible threats to the privacy of a user's data, location and activities from the use of the CovidSafe app.
  3. Discusses the issues of data sovereignty that may apply to the storage of CovidSafe data in U.S. based Cloud storage.
  4. You are to recommend that DoH adopt:
    1. Possible security controls that would prevent the loss or breach of user data, while still enabling effective tracking for COVID-19, and the reasons these controls will be effective.
    2. Possible privacy controls to protect user privacy, particularly of data, location and activity, while still enabling effective tracking of COVID-19, and the reasons these controls will be effective.
    3. Possible controls to ensure that the CovidSafe data remains under Australian data sovereignty and control, and the reasons these controls will be effective.

In: Computer Science

First, you will need to conduct research to identify two public organizations that have recently, or...

First, you will need to conduct research to identify two public organizations that have recently, or are currently, negotiating a conflict. Be sure there are newspaper articles or other resources that sufficiently document both sides of the conflict. Remember that when generating alternative solutions, the parties to a negotiation must both actively participate in the conflict resolution, so make sure you are able to identify documentation related to the efforts of negotiation coming from both sides the conflict. Watch for emotions, personality, and bias that may result in a party’s inability or unwillingness to listen or accept alternative solutions to a problem.

After sufficiently researching the conflict you will need to choose one side of the conflict you would like to represent. You will then need to create an Integrative Negotiation Planning Strategy for the party you are representing based on the facts of the conflict identified.

After you have completed your Integrative Negotiation Planning Strategy, summarize the conflict and proposed alternate solution. Be sure to describe the conflict.

  1. Identify the side that you have chosen.  
  2. What would be be your BATNA if the negotiation breaks down?
  3. What are your most important interests, ranked in order?
  4. What is the other side’s BATNA and what is its interests?
  5. Does each side have any interests that may be mutual?
  6. What value may be created for resolving the conflict?
  7. Identify any emotions, personality, and bias you observed in the conflict and how that affected negotiation.

In: Operations Management

Organizational Analysis Paper Instructions Each student will write an 8-10-page paper on an organization of his...

Organizational Analysis Paper Instructions

Each student will write an 8-10-page paper on an organization of his or her choice. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font. The organizational analysis will contain the following sections:

  • Introduction of the organization, including history and background.
  • Organizational strategy.
  • Organizational design and your assessment of effectiveness.
  • Organizational culture.
  • Conclusion and what you would change about the selected organization for improvement.

In: Operations Management

Mention any three reconnaissance techniques. Briefly explain each of them (just one or two sentences). Why...

Mention any three reconnaissance techniques. Briefly explain each of them (just one or two sentences). Why reconnaissance is a threat to network security?

In: Computer Science

According to the EPA’s prospective analysis of the 1990 to 2010 period, total social benefits (TSB)...

According to the EPA’s prospective analysis of the 1990 to 2010 period, total social benefits (TSB) associated with the CAAA of 1990 are estimated at $690 billion and the comparable total social cost (TSC) estimates are $180 billion (both in $1990).

a. Explain why these data do not communicate whether the regulations outlined by the CAAA of 1990 are efficient.

b. Using three separately labeled graphs of conventionally-shaped TSB and TSC functions show that these values indicate that the regulations outlined in the CAAA of 1990 are (i) efficient; (ii) too lenient; and (iii) too stringent.

In: Economics

What are the advantages of filtering using Slicers over using filtering in Excel?

What are the advantages of filtering using Slicers over using filtering in Excel?

In: Computer Science

write me an  email message with at minimum of 3-paragraphs (opening/body/close) providing a summary and highlighting your...

write me an  email message with at minimum of 3-paragraphs (opening/body/close) providing a summary and highlighting your thoughts on the speech by Steve Jobs .(video title is how to live before you die at Stanford university)

In: Operations Management

Will the brand equity of Coca Cola be a competitive advantage versus a private label (such...

Will the brand equity of Coca Cola be a competitive advantage versus a private label (such as a large grocery store chain)?

Please answer.

In: Operations Management

1. Discuss the link between a brand image and pricing strategy. 2. Discuss the advantages and...

1. Discuss the link between a brand image and pricing strategy.

2. Discuss the advantages and disadvantages of using social networks as part of a promotional campaign.

3. Discuss the advantages and disadvantages of celebrity endorsement in the promotion of fashion brands.

In: Operations Management

(a) Apply Maxwell relation and Gibb’s first equation (du=TdS-Pdv) to find the (∂u/∂P)_Trelation in terms of...

(a) Apply Maxwell relation and Gibb’s first equation (du=TdS-Pdv) to find the (∂u/∂P)_Trelation in terms of directly measurable properties (P, V and T). For an ideal gas, what will be the value of that partial derivative?

(b) Illustrate physical meaning of Inversion line with the help of T-P diagram.

(C) Assume that carbon dioxide (CO2) is collected from bacterial decomposition of organic matter at 5℃, and atmospheric pressure (100 kPa), and is required to be used in a process at -30℃, 40 bar. Apply theory of real gas behavior to calculate how much actual minimum work input and heat transfer is required to reach this state. Also, suggest some devices that can be used to obtain this state change

In: Mechanical Engineering

How is it that some woman in the Middle Easthave internalized misogyny?

How is it that some woman in the Middle Easthave internalized misogyny?

In: Psychology

What is Attachment theory? How can it be applied in order to understand employees’ cognitive processes...

What is Attachment theory? How can it be applied in order to understand employees’ cognitive processes and the effect of these processes on workplace engagement?

In: Psychology

I. Answer part A,B, C and D. 1a) Count the number of times a given char...

I. Answer part A,B, C and D.

1a)

Count the number of times a given char occurs in a given range of a String parameter (i.e. starting at a given start index, and up to but not including and end index). If end is greater than the length of the String, then the method should stop looking at the end of the String.


countCharsInRange("java", "v", 1, 2) → 0
countCharsInRange("java", "v", 0, 2) → 0
countCharsInRange("java", "v", 0, 3) → 1

1b)

Return a new String that removes all copies of the given char ch from the given String

removeChar("dog", "o") → "dg"
removeChar("cat", "o") → "cat"
removeChar("aaa", "a") → ""

1c)

Return the number of times the letter 'a' is directly followed by the letter 'b' in the given String.


countAB("abc") → 1
countAB("wxyz") → 0
countAB("bcaca") → 0

1d)

Return a new String that is a copy of the given String with each character copied the given number of times. Assume that n is 0 or more.


eachCharNTimes("abc", 2) → "aabbcc"
eachCharNTimes("xyz", 3) → "xxxyyyzzz"
eachCharNTimes("a", 5) → "aaaaa"

In: Computer Science

A powerful 0.54-W laser emitting 670-nm photons shines on a black sail of a tiny 0.10-g...

A powerful 0.54-W laser emitting 670-nm photons shines on a black sail of a tiny 0.10-g cart that can coast on a frictionless track.

Part A

Determine the force of the light on the sail. Assume that the light is totally absorbed by the sail.

Express your answer to two significant figures and include the appropriate units.

F =

7.01•106N

SubmitMy AnswersGive Up

Incorrect; Try Again; 5 attempts remaining

Part B

What time interval is needed for the cart's speed to increase from zero to 2.0 m/s?

Express your answer using two significant figures.

t =

.37•10−3

  s  

SubmitMy AnswersGive Up

Incorrect; Try Again; 5 attempts remaining

Provide FeedbackContinue

In: Physics

Memory is the ability to store and retrieve information over time and is the result of...

Memory is the ability to store and retrieve information over time and is the result of the processes of encoding, storage, and retrieval. Memory plays a role in the most mundane activities, such as remembering where the car keys are, and the most elaborate of processes, such as forming a personal identity or establishing neural connections. Memories are not passive recordings of the world, but instead result from combining incoming information with previous experiences. Encoding is the process of linking new and old information together and turning that information into lasting memories. Memory is influenced by the type of encoding we perform regardless of whether we consciously intend to remember an event, fact, or experience. Semantic encoding (actively linking incoming information to existing associations and knowledge), visual imagery encoding (converting incoming information into mental pictures), and organizational encoding (noticing relationships among items to be encoded) all enhance memory. Different regions within the frontal lobes play important roles in semantic encoding and organizational encoding, whereas the occipital lobes are important for visual imagery encoding.

Lucky Sevens Exercise

A casual glance at the world reveals that an inordinate number of things seem to conform to the 7 ± 2 rule made famous by George Miller in 1956, who found that the capacity of short-term memory was 7, plus or minus 2, chunks of information. The creations of ZIP codes, telephone numbers (with or without area code), Social Security numbers, and 5-, 7-, or 9-point Likert scales all suggest that people have difficulty keeping track of information that goes beyond 9 or so chunks, or discriminations. Furthermore, in 1961 anthropologist Anthony Wallace studied vastly different cultures ranging enormously in size and still found a striking similarity: In each case the number of dimensions needed to account for kinship terms (“aunt,” “cousin,” “father”) was relatively invariant, ranging from about 5 to 9. It seemed to Wallace that the development of language, even across cultures, obeyed the constraint found in human cognitive processing.

Looking at your current world, generate examples of people, events, or things in the word that can be packaged with this 7 (+ or – 2) range. Here are some examples to give you some ideas: lucky number 7; 7 days of the week; 7 dwarfs.

Do your examples of “set of seven” represent simple numerology and coincidence or were the examples designed specifically to better accommodate the human memory?

*** Provide information from one or more scholarly sources with an in-text citation and match referencing to support your discussion. Wikipedia is not a scholarly source. Discussion without a source will receive zero (0) point.

*** Responses to Discussion Question should be 200 words or more and substantive-this does not include assignment or references. A good practice to produce a response in Word Document to monitor word count, copy and paste into the message area. Please be sure to include proper APA in-text citation and reference for all information.

In: Psychology