Case study on discrimination for hiring/promotion

Instructions

Locate a recent court case, lawsuit, or an article addressing an actual court case/lawsuit on discrimination in the selection criteria and methods used for hiring or a promotion. Write a paper of at least 500 words in length about the selected court case/lawsuit. You are required to use at least your textbook and a court case as source material for your paper.

Be sure to include the following information in your paper:

  • Provide a brief description of the selected court case/lawsuit.
  • Identify the selection criteria and methods, and discuss how they relate to the needs of the organization in the case.
  • Include an analysis of the criteria and methods used for selecting the employee in the court case/lawsuit.
  • Include a discussion of the legal and ethical issues related to equal employment opportunity as they pertain to the employment selection process in this court case/lawsuit.
  • Explain what impact this court case, lawsuit, or article will have on HR management.

All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations in APA format.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Constructive feedback is the most effective type of feedback.

Clueless

Purpose: To help students identify effective and ineffective forms of feedback.

Watch the video clip Clueless. Pay particular attention to the audience feedback. Discuss how students would feel if they received the same feedback and ways the speaker can appropriately respond to such feedback.

Note: Constructive feedback is the most effective type of feedback.

Video link to Clueless:

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

SEC 402 Strayer University Network and Personnel Security Measures

Assignment 2: Implementing Network and Personnel Security Measures

The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.

Write a four to five (4-5) page paper in which you:

1. Create an information flow diagram, using Visio or Dia, which:
a. Illustrates how remote users will securely connect to the government agency’s network.
b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to server.

Note: The graphically depicted solution is not included in the required page length.

2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list:

a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.
b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment.

3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you:

a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
b. Indicate specific activities, personnel / resources required, and frequency of execution.

4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic assets.

5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your recommendations with your response.

6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security from within the organization. Provide a rationale with your response.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.
  • Describe best practices in cybersecurity.
  • Describe system, application, network, and telecommunications security policies and response.
  • Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.
  • Use technology and information resources to research issues in cybersecurity.
  • Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Compare and contrast what ethical issue I take from the movies

Prepare a 5-7 page Double-Spaced paper comparing the ethical perspectives in the films and discuss how critical thinking or the lack of critical thinking played a factor.

Using the following videos that were viewed this semester:

Twilight Zone-Death Heads Revisited ( Season 3), Mississippi Burning, 4 Little Girls, Schindler’s List, American History X, The Greatest Showman, Crucible and Rosewood.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

CCTV Technology and Security Essay

You may write on any topic related to technology security.

You must produce a minimum of a 10 pages paper. You must use a minimum of 5 references.

– Assure you are citing in APA format

-You must use a minimum of one graphics (may use a table)

– Doublespace the paper

– You must use APA formatting (6th Edition)

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

CMIT369 UMUC Windows Server 2016 Project Computer Science Help

There are specific requirements for the assignment: The final submission should contain at least 6 pages’ worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages’ worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, file share hierarchy, or anything else that is worth displaying graphically to enhance the reader’s understanding of the proposal. Additional diagrams, images, or tables are welcome.

The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMUC’s “Policy on Academic Dishonesty and Plagiarism.” It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Wells Fargo Brand Scandal Business Case Study Help

Here is what my professor sent me about my research plan:(Research1.pdf)

Looks OK so far, Branden. Since this scandal is at least two years old, you should focus on the continued fallout for Wells Fargo. In other words, make sure your report is current, with the most recent information. Keep me posted on your research, and as always, let me know how I can help. I’ll check back with you in class on Monday.

Here is a sample of the report (Beauty Industry).

here is a link to my professors guide to the report

https://sdsu.zoom.us/recording/play/3icaQSRJqIdguk…

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

instructions attached

attached is the discussion instructions and the chapter reading. please respond substantively to the questions and ensure all necessary resources are used to support claims. Also, just a reminder that these discussions do not need a title page, separate reference page, double spaced as well as an introduction and conclusion.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

International Migration and National Security discussion

The assignment is 6 pages double space and must cover a national security topic. Your choice on the topic. If you want to write a typical research paper, by all means do so. However, other students prefer to look at policy issues, such as should the US stay in or opt out of the Iran Nuclear deal and why? Or, what would be a better policy option. Such students prefer a policy focused paper, whereas a typical research paper is mostly to inform. The focus is not on format but on how well you write and put ideas together in a rational matter. I also expect thorough research and evidence with 5 -6 credible sources.Make use of current congressional proposal on immigration if that topic is elected. Must use atleast 2 sources from google scholar and 3 from credible sources:

Topics select from :

Use a domestic or foreign policy issue (Immigration; Health Care; Ferguson Situation; Russia in Ukraine; Iraq; China in Latin America; Intelligence Failures; Israel/Hamas; Russia in Latin America, Immigration,
The Iran Nuclear deal , relations with North Korea, Climate Change, rwanda genocide and the UN an USA

if you do not like any topic above an have a topic in mind that you prefer using, let me know first for approval.

I ATTACHED A GUIDANCE TO THE PAPER

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

GEN 499 Ashford University Children’s Rights Assignment

Introduction, Thesis Statement, and Annotated Bibliography

[WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 2, 3, 4, 5]

Prepare: To help with the preparation of your annotated bibliography, review the following tutorials and resources from the Ashford Writing Center:

Reflect: Reflect back on the Week 1 discussion in which you shared with the class the global societal issue that you would like to further address. Explore critical insights that were shared by your peers and/or your instructor on the topic chosen and begin your search for scholarly sources with those insights in mind.

Write: For this assignment, review the Annotated Bibliography Formatting Guidelines and address the following prompts:

  • Introductory paragraph to topic (refer to the Final Paper guidelines for your topic selection).
    • Write an introductory paragraph with at least 150 words that clearly explains the topic, the importance of further research, and ethical implications.
  • Thesis statement.
    • Write a direct and concise thesis statement, which will become the solution to the problem that you will argue or prove in the Week 5 Final Paper. (A thesis statement should be a concise, declarative statement. The thesis statement must appear at the end of the introductory paragraph.)
  • Annotated bibliography.
    • Develop an annotated bibliography to indicate the quality of the sources you have read.
    • Summarize in your own words how the source contributes to the solution of the global societal issue for each annotation.
    • Address fully the purpose, content, evidence, and relation to other sources you found on this topic (your annotation should be one to two paragraphs long—150 words or more.
    • Include no less than five scholarly sources in the annotated bibliography that will be used to support the major points of the Final Paper.
    • Demonstrate critical thinking skills by accurately interpreting evidence used to support various positions of the topic.

The Introduction, Thesis Statement, and Annotated Bibliography

Childrens Rights I would prefer to based this paper and FINAL PAPER on

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"